Langchaingo supports the use of jinja2 syntax when parsing prompts, which is in turn parsed using the gonja library v1.5.3.
Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file.
Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 12 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Fri, 12 Sep 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Langchaingo supports the use of jinja2 syntax when parsing prompts, which is in turn parsed using the gonja library v1.5.3. Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file. | |
Title | CVE-2025-9556 | |
References |
|

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-09-12T14:01:03.976Z
Reserved: 2025-08-27T18:10:47.686Z
Link: CVE-2025-9556

Updated: 2025-09-12T14:00:48.283Z

Status : Received
Published: 2025-09-12T14:15:42.300
Modified: 2025-09-12T14:15:42.300
Link: CVE-2025-9556

No data.

No data.