CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
91.2%
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the load_prompt
parameter. This is related to __subclasses__
or a template.
aisec.today/LangChain-2e6244a313dd46139c5ef28cbcab9e55
github.com/advisories/GHSA-7gfq-f96f-g85j
github.com/hwchase17/langchain/issues/4394
github.com/langchain-ai/langchain/commit/22abeb9f6cc555591bf8e92b5e328e43aa07ff6c
github.com/langchain-ai/langchain/pull/10252
github.com/langchain-ai/langchain/releases/tag/v0.0.312
github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-151.yaml
nvd.nist.gov/vuln/detail/CVE-2023-36281
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
91.2%