Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qh6h-p6c9-ff54 | LangChain Core has Path Traversal vulnerabilites in legacy `load_prompt` functions |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain
Langchain langchain |
|
| CPEs | cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Langchain
Langchain langchain |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain-ai
Langchain-ai langchain |
|
| Vendors & Products |
Langchain-ai
Langchain-ai langchain |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 31 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directory traversal or absolute path injection. When an application passes user-influenced prompt configurations to load_prompt() or load_prompt_from_config(), an attacker can read arbitrary files on the host filesystem, constrained only by file-extension checks (.txt for templates, .json/.yaml for examples). This issue has been patched in version 1.2.22. | |
| Title | LangChain Core has Path Traversal vulnerabilites in legacy `load_prompt` functions | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-31T18:04:59.283Z
Reserved: 2026-03-25T16:21:40.867Z
Link: CVE-2026-34070
Updated: 2026-03-31T15:17:43.293Z
Status : Analyzed
Published: 2026-03-31T03:15:58.947
Modified: 2026-04-02T17:04:43.713
Link: CVE-2026-34070
OpenCVE Enrichment
Updated: 2026-04-03T09:19:34Z
Github GHSA