Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29045 | Langchaingo supports the use of jinja2 syntax when parsing prompts, which is in turn parsed using the gonja library v1.5.3. Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file. |
Mon, 03 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 15 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain
Langchain langchain |
|
| Vendors & Products |
Langchain
Langchain langchain |
Fri, 12 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 12 Sep 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Langchaingo supports the use of jinja2 syntax when parsing prompts, which is in turn parsed using the gonja library v1.5.3. Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file. | |
| Title | CVE-2025-9556 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-11-03T18:14:18.939Z
Reserved: 2025-08-27T18:10:47.686Z
Link: CVE-2025-9556
Updated: 2025-11-03T18:14:18.939Z
Status : Deferred
Published: 2025-09-12T14:15:42.300
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-9556
No data.
OpenCVE Enrichment
Updated: 2025-09-15T10:43:46Z
No weakness.
EUVD