Safety vulnerability ID: 71609
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the LangChain package are vulnerable to Path Traversal due to improper sanitization of the path parameter in the `load_chain` call. The `load_chain` function allows user input to manipulate the final part of the path, enabling traversal outside the intended directory scope. An attacker can exploit this by crafting a path that accesses sensitive files, potentially leading to Information Disclosure of API keys or even Remote Code Execution if malicious scripts are executed.
Latest version: 1.0.3
Building applications with LLMs through composability
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application