Impact
LangSmith Studio is vulnerable to a URL parameter injection flaw that allows an attacker to embed a malicious baseUrl in a link. When an authenticated user clicks the link, the vulnerable application transmits the user's bearer token, user ID, and workspace ID to the attacker-controlled server. This leads to immediate impersonation of the victim within the affected workspace. The flaw is a classic example of input validation weakness (CWE‑74).
Affected Systems
The issue exists in deployments that use the langchain‑ai Helm charts for LangSmith on Kubernetes prior to chart version 0.12.71. Both the cloud‑based and self‑hosted instances of LangSmith Studio are impacted. The vulnerability surfaces in any hosting environment where the Helm chart version is older than the patched release.
Risk and Exploitability
The CVSS score of 8.5 classifies this as high‑severity. EPSS is below 1 %, indicating a low probability of exploitation under current conditions, and the flaw is not yet listed in the CISA KEV catalog. However, successful attacks require only social engineering to entice a user to click a crafted link, a common vector in phishing campaigns. Tokens are short‑lived, expiring after five minutes, but repeated social engineering could repeatedly harvest them. Once captured, an attacker can perform any action that the victim was authorized to execute within the workspace.
OpenCVE Enrichment