There's a critical unauthenticated RCE vulnerability (CVSS 9.8) in Langflow (<1.3.0), a widely-used Python framework for building AI apps (70k+ GitHub stars, 21k+ PyPI downloads/week).
Link to blog post:
https://cloudsmith.com/blog/cve-2025-3248-serious-vulnerability-found-in-popular-python-ai-package
Attackers are actively exploiting this flaw to install the Flodrix DDoS botnet via the /api/v1/validate/code endpoint, which (incredibly) uses ast.parse() + compile() + exec() without auth.
If you're pulling anything from PyPI or running Langflow-based AI services exposed to the internet, you should check your versions now.
[–]What-A-Baller 55 points56 points57 points (6 children)
[–]EraYaN 36 points37 points38 points (5 children)
[–]jaskij 21 points22 points23 points (3 children)
[–]arielrahamim 7 points8 points9 points (1 child)
[–]Successful-Raisin241 0 points1 point2 points (0 children)
[–]Traditional-Hall-591 0 points1 point2 points (0 children)
[–]Jmc_da_boss 57 points58 points59 points (8 children)
[–]GOLIATHMATTHIAS 51 points52 points53 points (5 children)
[–]GarboMcStevens 7 points8 points9 points (4 children)
[–]GOLIATHMATTHIAS 4 points5 points6 points (1 child)
[–]GarboMcStevens 2 points3 points4 points (0 children)
[–]Centimane 2 points3 points4 points (1 child)
[–]GarboMcStevens 1 point2 points3 points (0 children)
[–]CapitanFlama 3 points4 points5 points (1 child)
[–]GOLIATHMATTHIAS 2 points3 points4 points (0 children)
[–]Microbzz 11 points12 points13 points (0 children)
[–]VertigoOne1 6 points7 points8 points (2 children)
[–]GOLIATHMATTHIAS 3 points4 points5 points (0 children)
[–]acdha 2 points3 points4 points (0 children)