No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7069 | langchain-core allows unauthorized users to read arbitrary files from the host file system |
Github GHSA |
GHSA-5chr-fjjv-38qv | langchain-core allows unauthorized users to read arbitrary files from the host file system |
Fri, 21 Mar 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability to create langchain_core.prompts.ImagePromptTemplate's (and by extension langchain_core.prompts.ChatPromptTemplate's) with input variables that can read any user-specified path from the server file system. If the outputs of these prompt templates are exposed to the user, either directly or through downstream model outputs, it can lead to the exposure of sensitive information. | |
| Title | Exposure of Sensitive System Information via ImagePromptTemplate in langchain-ai/langchain | |
| Weaknesses | CWE-497 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T19:02:58.871Z
Reserved: 2024-11-06T19:50:09.607Z
Link: CVE-2024-10940
Updated: 2025-03-20T17:54:58.847Z
Status : Deferred
Published: 2025-03-20T10:15:21.850
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-10940
OpenCVE Enrichment
Updated: 2025-07-12T22:45:02Z
EUVD
Github GHSA