A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability to create langchain_core.prompts.ImagePromptTemplate's (and by extension langchain_core.prompts.ChatPromptTemplate's) with input variables that can read any user-specified path from the server file system. If the outputs of these prompt templates are exposed to the user, either directly or through downstream model outputs, it can lead to the exposure of sensitive information.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 21 Mar 2025 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | threat_severity 
 | 
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability to create langchain_core.prompts.ImagePromptTemplate's (and by extension langchain_core.prompts.ChatPromptTemplate's) with input variables that can read any user-specified path from the server file system. If the outputs of these prompt templates are exposed to the user, either directly or through downstream model outputs, it can lead to the exposure of sensitive information. | |
| Title | Exposure of Sensitive System Information via ImagePromptTemplate in langchain-ai/langchain | |
| Weaknesses | CWE-497 | |
| References |  | |
| Metrics | cvssV3_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:08:48.628Z
Updated: 2025-03-20T19:02:58.871Z
Reserved: 2024-11-06T19:50:09.607Z
Link: CVE-2024-10940
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-03-20T17:54:58.847Z
 NVD
                        NVD
                    Status : Received
Published: 2025-03-20T10:15:21.850
Modified: 2025-03-20T10:15:21.850
Link: CVE-2024-10940
 Redhat
                        Redhat
                     ReportizFlow
ReportizFlow