Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r7w7-9xr2-qq2r | langchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding |
Tue, 28 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain
Langchain langchain-openai |
|
| CPEs | cpe:2.3:a:langchain:langchain-openai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Langchain
Langchain langchain-openai |
Tue, 28 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 27 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain-ai
Langchain-ai langchain |
|
| Vendors & Products |
Langchain-ai
Langchain-ai langchain |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with independent DNS resolution. This left a TOCTOU / DNS rebinding window: an attacker-controlled hostname could resolve to a public IP during validation and then to a private/localhost IP during the actual fetch. | |
| Title | angchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-27T13:40:42.065Z
Reserved: 2026-04-20T16:14:19.007Z
Link: CVE-2026-41488
Updated: 2026-04-27T13:40:38.447Z
Status : Analyzed
Published: 2026-04-24T21:16:19.637
Modified: 2026-04-28T18:17:09.553
Link: CVE-2026-41488
OpenCVE Enrichment
Updated: 2026-04-28T20:00:19Z
Github GHSA