Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27444: n/a

0
Critical
VulnerabilityCVE-2024-27444cvecve-2024-27444
Published: Mon Feb 26 2024 (02/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute in Python code. These are not prohibited by pal_chain/base.py.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:40:47 UTC

Technical Analysis

CVE-2024-27444 is a critical vulnerability affecting the LangChain Experimental library prior to version 0.1.8. LangChain is a popular framework used for building applications with large language models, often involving dynamic Python code execution. This vulnerability specifically allows attackers to bypass the fix implemented for CVE-2023-44467 by exploiting the unsafe handling of certain Python special attributes within the pal_chain/base.py module. These attributes include __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, and __base__, which provide powerful introspection and code execution capabilities in Python. Because these attributes are not prohibited or sanitized, an attacker can craft malicious input that leverages them to execute arbitrary Python code remotely. The vulnerability requires no authentication and no user interaction, making it highly exploitable over the network. The CVSS v3.1 score of 9.8 reflects the criticality, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. The flaw falls under CWE-749 (Exposed Dangerous Method or Function). Although no public exploits are known yet, the severity and ease of exploitation make this a significant threat to any organization using vulnerable versions of LangChain Experimental. Immediate patching and code audits are essential to mitigate risk.

Potential Impact

The impact of CVE-2024-27444 is severe for organizations worldwide that utilize LangChain Experimental in their AI or software development workflows. Successful exploitation allows remote attackers to execute arbitrary code, potentially leading to full system compromise, data theft, data corruption, or service disruption. Confidentiality is at high risk as attackers can access sensitive data or credentials. Integrity is compromised because attackers can modify code or data. Availability is threatened through potential denial-of-service or ransomware deployment. Since LangChain is increasingly adopted in AI-driven applications, including those handling sensitive business logic or data pipelines, this vulnerability could lead to significant operational and reputational damage. The lack of authentication and user interaction requirements means attackers can exploit this remotely and stealthily, increasing the likelihood of widespread impact if unpatched. Organizations relying on cloud services or AI platforms integrating LangChain are particularly vulnerable.

Mitigation Recommendations

To mitigate CVE-2024-27444, organizations should immediately upgrade LangChain Experimental to version 0.1.8 or later, where this vulnerability is addressed. If upgrading is not immediately feasible, restrict or disable the use of dynamic Python code execution features that rely on the vulnerable pal_chain/base.py module. Implement strict input validation and sanitization to prevent malicious payloads from reaching vulnerable code paths. Employ runtime application self-protection (RASP) or sandboxing techniques to limit the impact of arbitrary code execution. Monitor logs and network traffic for suspicious activity indicative of exploitation attempts. Conduct code reviews focusing on the use of Python special attributes and dynamic imports. Additionally, enforce the principle of least privilege on systems running LangChain to minimize damage from potential exploitation. Stay informed on vendor advisories and threat intelligence for any emerging exploits.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d7db7ef31ef0b579ad9

Added to database: 2/25/2026, 9:45:33 PM

Last enriched: 2/26/2026, 10:40:47 PM

Last updated: 4/12/2026, 9:13:11 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses