9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.012 Low
EPSS
Percentile
85.1%
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the load_prompt
parameter. This is related to __subclasses__
or a template.
aisec.today/LangChain-2e6244a313dd46139c5ef28cbcab9e55
github.com/hwchase17/langchain/issues/4394
github.com/langchain-ai/langchain
github.com/langchain-ai/langchain/commit/22abeb9f6cc555591bf8e92b5e328e43aa07ff6c
github.com/langchain-ai/langchain/pull/10252
github.com/langchain-ai/langchain/releases/tag/v0.0.312
github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-151.yaml
nvd.nist.gov/vuln/detail/CVE-2023-36281
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.012 Low
EPSS
Percentile
85.1%