Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7069 | langchain-core allows unauthorized users to read arbitrary files from the host file system |
Github GHSA |
GHSA-5chr-fjjv-38qv | langchain-core allows unauthorized users to read arbitrary files from the host file system |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 21 Mar 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability to create langchain_core.prompts.ImagePromptTemplate's (and by extension langchain_core.prompts.ChatPromptTemplate's) with input variables that can read any user-specified path from the server file system. If the outputs of these prompt templates are exposed to the user, either directly or through downstream model outputs, it can lead to the exposure of sensitive information. | |
| Title | Exposure of Sensitive System Information via ImagePromptTemplate in langchain-ai/langchain | |
| Weaknesses | CWE-497 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T19:02:58.871Z
Reserved: 2024-11-06T19:50:09.607Z
Link: CVE-2024-10940
Updated: 2025-03-20T17:54:58.847Z
Status : Received
Published: 2025-03-20T10:15:21.850
Modified: 2025-03-20T10:15:21.850
Link: CVE-2024-10940
OpenCVE Enrichment
Updated: 2025-07-12T22:45:02Z
EUVD
Github GHSA