Flodrix Botnet Exploits Critical Langflow Flaw CVE-2025-3248

  • A new cyberattack campaign is exploiting a critical flaw in Langflow to install the Flodrix botnet.
  • The vulnerability, CVE-2025-3248, allows remote code execution on unpatched Langflow servers.
  • Attackers use public proof-of-concept code to compromise vulnerable systems and deploy Flodrix.
  • The Flodrix botnet can launch DDoS attacks, remove traces of itself, and communicate via the TOR network.
  • Security experts advise immediate updates to Langflow version 1.3.0 or later to close the vulnerability.

On June 17, 2025, Cybersecurity researchers reported a new set of attacks using a severe vulnerability in the Python-based visual AI framework Langflow. Hackers are targeting exposed Langflow servers by exploiting a critical missing authentication flaw to install the Flodrix botnet Malware.

- Advertisement -

The vulnerability, tracked as CVE-2025-3248 with a CVSS score of 9.8, enables unauthorized attackers to execute any code on compromised servers via specially crafted web requests. Trend Micro researchers stated that attackers are running downloader scripts on affected systems, which then fetch and execute the Flodrix malware. Langflow addressed this problem in March 2025 with the release of version 1.3.0.

Last month, U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned about active exploitation of this flaw, confirming reports of live attack attempts targeting internet-exposed Langflow instances. Attackers are using a publicly available proof-of-concept code to scan for and access unpatched servers. Once inside, Hacker-controlled scripts download Flodrix from a remote server.

According to Trend Micro, the Flodrix botnet establishes connections with a command center, receiving instructions to conduct distributed denial-of-service (DDoS) attacks on designated targets. The malware can also operate over the TOR Anonymity network to mask communications. Researchers explained, “Since Langflow does not enforce input validation or sandboxing, these payloads are compiled and executed within the server’s context, leading to remote code execution.”

Trend Micro noted different downloader scripts hosted on the same infrastructure used for Flodrix, indicating that threat actors are actively adapting and expanding this campaign. They also identified Flodrix as an evolved form of the LeetHozer botnet linked to the Moobot group.

The Flodrix variant includes features to erase itself and obscure connection addresses, making detection and analysis harder. It deploys new encrypted DDoS attack types and scans running processes for added stealth. Researchers believe attackers are surveying all potential vulnerable servers to choose high-value targets.

Experts strongly recommend updating all Langflow deployments to version 1.3.0 or above. The vulnerability remains a significant risk for any unpatched systems exposed to the internet.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Crypto Traders Mull Lawsuit After $242M Polymarket Suit Controversy

Crypto traders plan legal action against Polymarket over the resolution of a $242 million...

Remixpoint Raises $215M to Expand Bitcoin Treasury Holdings

Remixpoint raised $215 million in funding to grow its Bitcoin holdings. The company will use...

U.S. Sanctions North Korean Hacker for Remote IT Worker Scheme

The U.S. Treasury sanctioned a North Korean national linked to a fraudulent remote IT...

BRICS 2025 Summit Ignores New Currency, De-Dollarization Plans

BRICS leaders did not discuss launching a new common currency or a de-dollarization agenda...

Detroit man admits sending cryptocurrency donations to ISIS

A Detroit resident admitted guilt to attempting to send cryptocurrency donations to ISIS.The individual...

Must Read

13 Best Bitcoin Casinos & Crypto Casinos

Online betting has always been a popular and easy option to play from the comfort of your home or on the go, and with...