CVE MEDIUM CVE-2026-27795

LangChain is a framework for building LLM-powered applications. Prior to version 1.1.8, a redirect-based Server-Side Request Forgery (SSRF) bypass exists in `RecursiveUrlLoader` in `@langchain/community`. The loader validates

CVE MEDIUM CVE-2026-26019

LangChain is a framework for building LLM-powered applications. Prior to 1.1.14, the RecursiveUrlLoader class in @langchain/community is a web crawler that recursively follows links from a starting

CVSS 4.1 langchain_community View details
Paper 2512.23557v1

Toward Trustworthy Agentic AI: A Multimodal Framework for Preventing Prompt Injection Attacks

Large Language Models (LLMs), Vision-Language Models (VLMs), and new agentic AI systems, like LangChain and GraphChain. Nevertheless, this agentic environment increases the probability of the occurrence of multimodal prompt

high relevance tool
CVE MEDIUM CVE-2025-58177

stored cross-site scripting (XSS) vulnerability in @n8n/n8n-nodes-langchain.chatTrigger. An authorized user can configure the LangChain Chat Trigger node with malicious JavaScript in the initialMessages field and enable public access

CVSS 5.4 n8n View details
CVE MEDIUM CVE-2025-6854

vulnerability classified as problematic was found in chatchat-space Langchain-Chatchat up to 0.3.1. This vulnerability affects unknown code of the file /v1/files?purpose=assistants. The manipulation leads to path

CVSS 4.3 langchain-chatchat View details
CVE MEDIUM CVE-2024-10940

vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability

CVSS 5.3 langchain-core View details
CVE MEDIUM CVE-2024-2965

Denial of service in langchain-community

CVSS 4.2 langchain View details
CVE MEDIUM CVE-2024-1455

vulnerability in the langchain-ai/langchain repository allows for a Billion Laughs Attack, a type of XML External Entity (XXE) exploitation. By nesting multiple layers of entities within

CVSS 5.9 langchain View details
Paper 2603.15125v1

From Storage to Steering: Memory Control Flow Attacks on LLM Agents

Gemini 2.5 Flash on real-world tools from two major LLM agent development frameworks, LangChain and LlamaIndex. The results show that in general over 90% trials are vulnerable to MCFA

high relevance attack
CVE MEDIUM CVE-2026-28277

LangGraph checkpoint loading has unsafe msgpack deserialization

CVSS 6.8 langgraph View details
Paper 2512.23480v1

Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation

agent coordination. The suggested system utilizes specialized security agents coordinated with the help of LangChain and LangGraph, communicates with actual CI/CD environments with the Model Context Protocol (MCP), and documents

high relevance defense
Paper 2512.18542v2

SecureCode: A Production-Grade Multi-Turn Dataset for Training Security-Aware Code Generation Models

OWASP LLM Top 10 2025 categories across more than 40 frameworks, including LangChain, OpenAI, and Hugging Face). Every example follows a 4-turn conversational structure -- feature request; vulnerable and secure

medium relevance benchmark
Paper 2510.19264v1

LAPRAD: LLM-Assisted PRotocol Attack Discovery

different LLM automatically constructs the corresponding attack configurations using the ReACT approach implemented via LangChain (DNS zone file generation). Finally, in the third stage, we validate the attack's functionality

high relevance attack