Langchaingo supports the use of jinja2 syntax when parsing prompts, which is in turn parsed using the gonja library v1.5.3.
Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file.
Metrics
Affected Vendors & Products
References
History
Mon, 15 Sep 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Langchain
Langchain langchain |
|
Vendors & Products |
Langchain
Langchain langchain |
Fri, 12 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Fri, 12 Sep 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Langchaingo supports the use of jinja2 syntax when parsing prompts, which is in turn parsed using the gonja library v1.5.3. Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file. | |
Title | CVE-2025-9556 | |
References |
|

Status: PUBLISHED
Assigner: certcc
Published: 2025-09-12T13:45:14.684Z
Updated: 2025-09-12T14:01:03.976Z
Reserved: 2025-08-27T18:10:47.686Z
Link: CVE-2025-9556

Updated: 2025-09-12T14:00:48.283Z

Status : Awaiting Analysis
Published: 2025-09-12T14:15:42.300
Modified: 2025-09-15T15:21:42.937
Link: CVE-2025-9556

No data.