Impact
A redirect-based Server‑Side Request Forgery bypass exists in the RecursiveUrlLoader component of @langchain/community. The loader authenticates the initial URL but allows the underlying fetch call to follow HTTP redirects automatically without re‑validating each hop. This flaw enables a malicious actor to start from a seemingly safe public URL and be redirected to unsecured internal or metadata endpoints, potentially exposing sensitive data or internal services. The weakness is classified as CWE‑918.
Affected Systems
The vulnerability affects the LangChain Community package (langchain-ai:langchainjs) for Node.js. Versions prior to 1.1.8 are impacted. The fix was implemented in version 1.1.18, which validates every redirect target, disables automatic redirects, and enforces a strict redirect limit.
Risk and Exploitability
The severity is assessed with a CVSS score of 4.1, indicating moderate risk. The EPSS score is less than 1%, suggesting a low likelihood of exploitation at this time. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is inferred to be application‑controlled HTTP requests that invoke RecursiveUrlLoader, allowing an attacker to supply crafted URLs or manipulate redirects to reach internal services.
OpenCVE Enrichment
Github GHSA