Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

NYC, San Francisco and other US cities capping LGBTQ+ Pride month with a mix of party and protest

June 28, 2025

At Hermès, woven leather and quiet confidence set the tone for Paris menswear

June 28, 2025

In words and photos, rural Alaska residents reflect on their village’s sustainable practices

June 28, 2025
Facebook X (Twitter) Instagram
Trending
  • NYC, San Francisco and other US cities capping LGBTQ+ Pride month with a mix of party and protest
  • At Hermès, woven leather and quiet confidence set the tone for Paris menswear
  • In words and photos, rural Alaska residents reflect on their village’s sustainable practices
  • Tips to protect yourself from ticks year-round
  • Irish rap group Kneecap plays at Glastonbury despite criticism
  • With ‘Nobu,’ famed chef serves miso cod with a side of inspiration
  • Junya Watanabe’s rebellious dandies take over Paris Fashion Week
  • Fusion between culture and modernity as children dance in Kenya’s refugee camp
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Sunday, June 29
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Critical Vulnerability in AI Builder Langflow Under Attack
Cybersecurity

Critical Vulnerability in AI Builder Langflow Under Attack

adminBy adminMay 6, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 56


The US cybersecurity agency CISA on Monday issued an alert on a recent Langflow vulnerability being exploited in the wild.

A Python-based, LLM agnostic AI builder, Langflow is a customizable visual framework that supports the development of multi-agent and retrieval augmented generation (RAG) applications.

Tracked as CVE-2025-3248 (CVSS score of 9.8) and disclosed in early April, the exploited issue is described as a code injection issue in a code validation endpoint. It was resolved in Langflow version 1.3.0.

“A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code,” a NIST advisory reads.

On April 9, Horizon3.ai published technical details on the security defect, warning that proof-of-concept (PoC) exploit code targeting it had already been released and that it could be exploited to take full control of vulnerable servers.

“The vulnerable code is present in the earliest versions of Langflow dating back two years, and from our testing it appears most, if not all, versions prior to 1.3.0 are exploitable,” the cybersecurity firm warned, noting that it found multiple paths of exploiting the bug for remote code execution.

It also warned that the fix introduced in version 1.3.0 added an authentication requirement, but did not fully eliminate the flaw. Restricting network access to the framework should eliminate the risk of exploitation.

“Technically this vulnerability can still be exploited to escalate privileges from a regular user to a Langflow superuser, but that is already possible without this vulnerability too. We’re not really clear why Langflow distinguishes between superusers and regular users when all regular users can execute code on the server by design,” Horizon3.ai said.

Advertisement. Scroll to continue reading.

Censys data shows that there are roughly 460 internet-accessible Langflow hosts. However, it is unclear how many of these are vulnerable.

On April 5, CISA added CVE-2025-3248 to the Known Exploited Vulnerabilities (KEV) catalog, alerting federal agencies of its in-the-wild targeting.

The warning comes roughly a month after SANS’s Johannes Ullrich noticed a spike in hits to the vulnerable Langflow endpoint, fueled by Horizon3.ai’s report and the publicly available PoC code.

Per Binding Operational Directive (BOD) 22-01, federal agencies have until May 26 to apply patches for the security defect. However, all organizations are advised to prioritize the patching of the vulnerabilities in CISA’s KEV list.

Related: Critical Commvault Vulnerability in Attacker Crosshairs

Related: PoC Published for Exploited SonicWall Vulnerabilities

Related: CISA Warns of Exploited Broadcom, Commvault Vulnerabilities

Related: CISA Urges Urgent Patching for Exploited CentreStack, Windows Zero-Days



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Kim Kardashian, Oprah Winfrey And Tom Brady Arrive In Venice

June 26, 2025

Topline Celebrities and billionaires have arrived in Venice ahead of Amazon billionaire Jeff Bezos’ extravagant—and…

Forbes’ Richest Self-Made Women In The World 2025

June 25, 2025

Here’s How Much New York City Mayoral Candidate Zohran Mamdani Is Worth

June 25, 2025

Hims & Hers CEO No Longer A Billionaire After Novo Nordisk Deal Collapses

June 23, 2025
Our Picks

NYC, San Francisco and other US cities capping LGBTQ+ Pride month with a mix of party and protest

June 28, 2025

At Hermès, woven leather and quiet confidence set the tone for Paris menswear

June 28, 2025

In words and photos, rural Alaska residents reflect on their village’s sustainable practices

June 28, 2025

Tips to protect yourself from ticks year-round

June 28, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.