CVE-2024-5998
- EPSS 0.09%
- Veröffentlicht 17.09.2024 12:15:02
- Zuletzt bearbeitet 30.07.2025 16:22:43
A vulnerability in the FAISS.deserialize_from_bytes function of langchain-ai/langchain allows for pickle deserialization of untrusted data. This can lead to the execution of arbitrary commands via the os.system function. The issue affects the latest ...
CVE-2024-3095
- EPSS 0.16%
- Veröffentlicht 06.06.2024 19:15:59
- Zuletzt bearbeitet 21.11.2024 09:28:53
A Server-Side Request Forgery (SSRF) vulnerability exists in the Web Research Retriever component of langchain-ai/langchain version 0.1.5. The vulnerability arises because the Web Research Retriever does not restrict requests to remote internet addre...
CVE-2024-2965
- EPSS 0.04%
- Veröffentlicht 06.06.2024 19:15:55
- Zuletzt bearbeitet 21.11.2024 09:10:56
A Denial-of-Service (DoS) vulnerability exists in the `SitemapLoader` class of the `langchain-ai/langchain` repository, affecting all versions. The `parse_sitemap` method, responsible for parsing sitemaps and extracting URLs, lacks a mechanism to pre...
CVE-2024-3571
- EPSS 1.74%
- Veröffentlicht 16.04.2024 00:15:12
- Zuletzt bearbeitet 29.07.2025 19:19:25
langchain-ai/langchain is vulnerable to path traversal due to improper limitation of a pathname to a restricted directory ('Path Traversal') in its LocalFileStore functionality. An attacker can leverage this vulnerability to read or write files anywh...
CVE-2024-1455
- EPSS 0.1%
- Veröffentlicht 26.03.2024 14:15:08
- Zuletzt bearbeitet 30.07.2025 20:06:23
A vulnerability in the langchain-ai/langchain repository allows for a Billion Laughs Attack, a type of XML External Entity (XXE) exploitation. By nesting multiple layers of entities within an XML document, an attacker can cause the XML parser to cons...
CVE-2024-28088
- EPSS 10.69%
- Veröffentlicht 04.03.2024 00:15:47
- Zuletzt bearbeitet 08.01.2025 16:13:57
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub ...
CVE-2024-2057
- EPSS 0.05%
- Veröffentlicht 01.03.2024 12:15:48
- Zuletzt bearbeitet 04.03.2025 12:25:10
A vulnerability was found in LangChain langchain_community 0.0.26. It has been classified as critical. Affected is the function load_local in the library libs/community/langchain_community/retrievers/tfidf.py of the component TFIDFRetriever. The mani...
CVE-2024-0243
- EPSS 0.07%
- Veröffentlicht 26.02.2024 16:27:49
- Zuletzt bearbeitet 25.02.2025 22:56:19
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Soup url = "https://example.com" loader = RecursiveUrlLoader( url=url, max_depth=2, extractor=lambda x: Soup(x, "html.parser").text ) docs = loader.load() ``` ...
CVE-2023-32786
- EPSS 0.13%
- Veröffentlicht 20.10.2023 22:15:10
- Zuletzt bearbeitet 21.11.2024 08:04:01
In Langchain through 0.0.155, prompt injection allows an attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF and potentially injecting content into downstream tasks.
CVE-2023-46229
- EPSS 0.59%
- Veröffentlicht 19.10.2023 05:15:58
- Zuletzt bearbeitet 21.11.2024 08:28:07
LangChain before 0.0.317 allows SSRF via document_loaders/recursive_url_loader.py because crawling can proceed from an external server to an internal server.