Flodrix Botnet Exploits Critical Langflow Flaw CVE-2025-3248

  • A new cyberattack campaign is exploiting a critical flaw in Langflow to install the Flodrix botnet.
  • The vulnerability, CVE-2025-3248, allows remote code execution on unpatched Langflow servers.
  • Attackers use public proof-of-concept code to compromise vulnerable systems and deploy Flodrix.
  • The Flodrix botnet can launch DDoS attacks, remove traces of itself, and communicate via the TOR network.
  • Security experts advise immediate updates to Langflow version 1.3.0 or later to close the vulnerability.

On June 17, 2025, Cybersecurity researchers reported a new set of attacks using a severe vulnerability in the Python-based visual AI framework Langflow. Hackers are targeting exposed Langflow servers by exploiting a critical missing authentication flaw to install the Flodrix botnet Malware.

- Advertisement -

The vulnerability, tracked as CVE-2025-3248 with a CVSS score of 9.8, enables unauthorized attackers to execute any code on compromised servers via specially crafted web requests. Trend Micro researchers stated that attackers are running downloader scripts on affected systems, which then fetch and execute the Flodrix malware. Langflow addressed this problem in March 2025 with the release of version 1.3.0.

Last month, U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned about active exploitation of this flaw, confirming reports of live attack attempts targeting internet-exposed Langflow instances. Attackers are using a publicly available proof-of-concept code to scan for and access unpatched servers. Once inside, Hacker-controlled scripts download Flodrix from a remote server.

According to Trend Micro, the Flodrix botnet establishes connections with a command center, receiving instructions to conduct distributed denial-of-service (DDoS) attacks on designated targets. The malware can also operate over the TOR Anonymity network to mask communications. Researchers explained, “Since Langflow does not enforce input validation or sandboxing, these payloads are compiled and executed within the server’s context, leading to remote code execution.”

Trend Micro noted different downloader scripts hosted on the same infrastructure used for Flodrix, indicating that threat actors are actively adapting and expanding this campaign. They also identified Flodrix as an evolved form of the LeetHozer botnet linked to the Moobot group.

- Advertisement -

The Flodrix variant includes features to erase itself and obscure connection addresses, making detection and analysis harder. It deploys new encrypted DDoS attack types and scans running processes for added stealth. Researchers believe attackers are surveying all potential vulnerable servers to choose high-value targets.

Experts strongly recommend updating all Langflow deployments to version 1.3.0 or above. The vulnerability remains a significant risk for any unpatched systems exposed to the internet.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin Odds: 88% Chance of Higher Prices by 2027

An informal metric tracking Bitcoin's past monthly performance gives an 88% probability of BTC...

Russia Pursues BRICS and INSTC to Dodge Sanctions

Russia is pursuing the BRICS Bridge, a blockchain-based CBDC platform, to bypass Western sanctions...

XRP’s Price Crossroads: Can It Hit $2 or Crash to $1?

XRP surged from $1.10 to $1.48 recently, sparking trader speculation about a potential rally...

Bitdeer Sells All Bitcoin, Liquidates Treasury to Zero

Bitdeer, a major Bitcoin miner, liquidated its entire corporate treasury this week, selling 943.1...

Trump Imposes New Global Tariff After Court Defeat

The U.S. Supreme Court struck down President Trump's emergency tariffs on February 20, 2026,...

Must Read

9 DePIN Programs For Passive Income

Here’s something most people don’t realize: your smartphone and PC can generate passive income with almost no effort.I’m not talking about clicking ads for...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!