Langflow, the popular Python framework for rapid AI prototyping, is under siege after researchers disclosed CVE-2025-3248, a flaw in the /api/v1/validate/code endpoint that lets unauthenticated attackers execute arbitrary Python with a single crafted POST request. Unlike its LeetHozer predecessor, Flodrix forks child processes with misleading names, erases forensic artefacts, and refuses to reinfect a host if a hidden .system_idle file is present, signalling that the node is already enslaved. The vulnerability captures the traffic burst pattern during the first hour of compromise, while the flodrix process illustrates how the malware renames itself to imitate benign system daemons. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Until enterprises patch to v1.3.0 and firewall public endpoints, Flodrix will continue converting unguarded AI nodes into obedient siege engines—one crafted POST at a time. Polyswarm analysts noted the sudden appearance of new malware samples that shared an XOR-obfuscated string table and a self-deleting loader—traits that immediately tied them to the emerging Flodrix botnet lineage. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Within hours of the public proof-of-concept, threat actors began mass-scanning Shodan and FOFA for servers running versions prior to 1.3.0, silently pivoting from reconnaissance commands such as whoami to full remote shells. The attack chain begins with a 200-byte exploit that injects Python straight into Langflow’s worker process, spawning /tmp/docker—a downloader that fetches the main ELF payload over raw TCP or concealed Tor circuits. The campaign’s breadth is sobering: more than 1,600 internet-facing Langflow servers were found, many inside research clouds and start-up clusters where default configurations expose the vulnerable endpoint. Early victims report CPU spikes and outbound traffic to Tor relays minutes after breach, underscoring the botnet’s dual role as both DDoS canon and covert data siphon. Once executed, Flodrix checks for root privileges and, if successful, installs a systemd service named langflow-sync.service, guaranteeing reboot persistence. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. The stakes are high: once compromised, an instance can be weaponised for distributed denial-of-service (DDoS) attacks or wholesale data theft, jeopardising the very AI workflows it was meant to accelerate.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 30 Jun 2025 14:05:13 +0000