Description
langchain-ai/langchain is vulnerable to path traversal due to improper limitation of a pathname to a restricted directory ('Path Traversal') in its LocalFileStore functionality. An attacker can leverage this vulnerability to read or write files anywhere on the filesystem, potentially leading to information disclosure or remote code execution. The issue lies in the handling of file paths in the mset and mget methods, where user-supplied input is not adequately sanitized, allowing directory traversal sequences to reach unintended directories.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/2df3acdc-ee4f-4257-bbf8-a7de3870a9d8
Scores
CVSS v3
8.8
EPSS
0.0202
EPSS Percentile
83.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (2)
langchain/langchain
0.0.351
pypi/langchain
0 - 0.0.353PyPI
Published
Apr 16, 2024
Tracked Since
Feb 18, 2026