Description
LangBot is a global IM bot platform designed for LLMs. Prior to version 4.8.7, LangBot’s web UI renders user-supplied raw HTML using rehypeRaw, which can lead to a cross-site scripting (XSS) vulnerability. This issue has been patched in version 4.8.7.
Published: 2026-03-06
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

LangBot, a global IM bot platform for large language models, stores and displays user‑supplied content without proper sanitization in its web UI. Prior to version 4.8.7, raw HTML is rendered by the rehypeRaw plugin, allowing a malicious user to inject arbitrary scripts into the page. This forms a cross‑site scripting vulnerability that could let an attacker execute code in the browser of any authenticated or unauthenticated user who views the affected page, leading to theft of session tokens, defacement, or other browser‑based attacks. The weakness aligns with CWE‑79, which describes improper neutralization of code in user data.

Affected Systems

The vulnerability impacts all installations of LangBot running a version earlier than 4.8.7. The affected product is LangBot from the vendor langbot-app. No specific sub‑version ranges are listed beyond the defined cutoff of 4.8.7, so every deployment prior to that release is considered vulnerable.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate severity rating, and the EPSS score of less than 1% suggests exploitation probability is currently low. The vulnerability is not listed in the CISA KEV catalog, implying it has not yet been widely exploited in the wild. Attackers would likely inject a malicious HTML payload via any input field that the bot platform renders, and the injected script would execute in the context of the user’s browser. Because the vulnerability is limited to client‑side execution without privileging, the impact is confined to user session compromise rather than full system compromise.

Generated by OpenCVE AI on April 17, 2026 at 12:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LangBot to version 4.8.7 or later to remove the raw HTML rendering capability.
  • If an upgrade is not immediately feasible, reconfigure the application to disable the rehypeRaw plugin or enable strict input sanitization before rendering user content.
  • Continuously monitor for unsolicited script injections in the UI and audit logs for suspicious activity.

Generated by OpenCVE AI on April 17, 2026 at 12:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:langbot:langbot:*:*:*:*:*:*:*:*

Fri, 06 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Langbot
Langbot langbot
Vendors & Products Langbot
Langbot langbot

Fri, 06 Mar 2026 04:45:00 +0000

Type Values Removed Values Added
Description LangBot is a global IM bot platform designed for LLMs. Prior to version 4.8.7, LangBot’s web UI renders user-supplied raw HTML using rehypeRaw, which can lead to a cross-site scripting (XSS) vulnerability. This issue has been patched in version 4.8.7.
Title LangBot has a Cross Site Scripting(XSS) Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T16:07:49.499Z

Reserved: 2026-02-27T20:57:47.709Z

Link: CVE-2026-28509

cve-icon Vulnrichment

Updated: 2026-03-06T15:50:38.552Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T05:16:35.590

Modified: 2026-03-16T13:35:12.607

Link: CVE-2026-28509

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:30:06Z

Weaknesses