Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Recent Langflow Vulnerability Exploited by Flodrix Botnet

A critical Langflow vulnerability tracked as CVE-2025-3248 has been exploited to ensnare devices in the Flodrix botnet.

Botnet

Threat actors have been exploiting a recently patched Langflow vulnerability to ensnare devices in the Flodrix botnet, Trend Micro warned on Tuesday.

The flaw, tracked as CVE-2025-3248, started making headlines in early May, after the cybersecurity agency CISA added it to its Known Exploited Vulnerabilities (KEV) catalog.

The existence of the vulnerability, which can be exploited by a remote and unauthenticated attacker for arbitrary code execution, came to light in early April, after a patch was rolled out with the release of Langflow 1.3.0. 

Technical details and proof-of-concept (PoC) exploits started emerging roughly one week later. 

Langflow is a popular low-code development platform designed for the creation and deployment of AI agents and workflows. It has more than 70,000 stars on GitHub.

When CISA added CVE-2025-3248 to its KEV catalog, no information was available on the attacks exploiting the vulnerability. 

Advertisement. Scroll to continue reading.

Trend Micro has now revealed that the security hole has been exploited in Flodrix botnet attacks. Specifically, attackers scanned the internet for vulnerable Langflow instances and then leveraged one of the publicly available PoC exploits to achieve shell access on the system and run various commands for reconnaissance purposes.

The threat actor then downloaded and executed the Flodrix malware on the compromised systems. Once up and running, the malware establishes a connection to its C&C server and waits for commands from its operator. The Flodrix botnet is mainly used to conduct DDoS attacks. 

According to Trend Micro, the malware used in these attacks is an evolution of the LeetHozer malware analyzed by Chinese security firm Qihoo 360 back in 2020. 

While there are several similarities to LeetHozer, there are also some differences, including different response headers, multiple configuration options, new DDoS attack types, and additional layers of obfuscation.

“This variant employs multiple stealth techniques, including self-deletion and artifact removal, to minimize forensic traces and hinder detection. It also uses string obfuscation to conceal command-and-control (C&C) server addresses and other critical indicators, complicating analysis efforts,” Trend Micro said.

Threat intelligence firm GreyNoise has seen more than 370 IP addresses attempting to exploit CVE-2025-3248 over the past month, with the most recent attempts seen by the company on June 12. 

At the time of writing, the Censys search engine shows more than 1,600 internet-exposed Langflow instances, but it’s unclear how many of them are actually vulnerable to attacks.

Related: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability

Related: DanaBot Botnet Disrupted, 16 Suspects Charged

Related: US Announces Botnet Takedown, Charges Against Russian Administrators

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.