CVE-2024-28088: n/a
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
AI Analysis
Technical Summary
CVE-2024-28088 is a directory traversal vulnerability affecting LangChain versions through 0.1.10. LangChain is a framework that facilitates building applications with large language models. The vulnerability exists in the load_chain function, which is designed to load configuration files from the hwchase17/langchain-hub GitHub repository. However, the implementation allows an attacker who can control the final part of the path parameter to traverse directories using '../' sequences, thereby bypassing the intended repository restriction. This improper input validation (CWE-31) enables access to arbitrary files on the host system. The consequences include disclosure of sensitive information such as API keys for large language model services, which could be used to abuse or exhaust service quotas or incur financial costs. More critically, the vulnerability may allow remote code execution if an attacker can load malicious configurations or scripts. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality and integrity, with network attack vector, low attack complexity, and requiring privileges but no user interaction. A patch addressing this vulnerability was released in langchain-core version 0.1.29, which properly restricts path traversal and enforces loading only from the intended repository. No known exploits are currently reported in the wild, but the potential impact warrants immediate remediation.
Potential Impact
The vulnerability poses significant risks to organizations using LangChain versions up to 0.1.10. Disclosure of API keys can lead to unauthorized use of large language model services, resulting in data leakage, financial loss, and service disruption. Remote code execution could allow attackers to execute arbitrary commands on affected systems, potentially leading to full system compromise, lateral movement, and persistent access. Given LangChain's role in AI application development, exploitation could also undermine the integrity of AI workflows and data confidentiality. Organizations relying on LangChain for production or development environments face risks of intellectual property theft, data breaches, and operational disruption. The vulnerability's network accessibility and low complexity of exploitation increase the likelihood of targeted attacks, especially in environments where attackers have some level of access or control over input parameters.
Mitigation Recommendations
Organizations should immediately upgrade to langchain-core version 0.1.29 or later, which contains the patch that properly restricts path traversal in the load_chain function. Until upgrading, restrict access to the load_chain functionality to trusted users and environments only. Implement strict input validation and sanitization on path parameters to prevent directory traversal sequences. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with rules to detect and block directory traversal attempts. Monitor logs for suspicious access patterns involving '../' sequences or unexpected file access. Limit the permissions of the application process to the minimum necessary, preventing access to sensitive files and directories. Rotate any potentially exposed API keys and enforce usage monitoring and anomaly detection on large language model service accounts. Conduct security reviews of AI application configurations to detect unauthorized changes or malicious payloads.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Netherlands
CVE-2024-28088: n/a
Description
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-28088 is a directory traversal vulnerability affecting LangChain versions through 0.1.10. LangChain is a framework that facilitates building applications with large language models. The vulnerability exists in the load_chain function, which is designed to load configuration files from the hwchase17/langchain-hub GitHub repository. However, the implementation allows an attacker who can control the final part of the path parameter to traverse directories using '../' sequences, thereby bypassing the intended repository restriction. This improper input validation (CWE-31) enables access to arbitrary files on the host system. The consequences include disclosure of sensitive information such as API keys for large language model services, which could be used to abuse or exhaust service quotas or incur financial costs. More critically, the vulnerability may allow remote code execution if an attacker can load malicious configurations or scripts. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality and integrity, with network attack vector, low attack complexity, and requiring privileges but no user interaction. A patch addressing this vulnerability was released in langchain-core version 0.1.29, which properly restricts path traversal and enforces loading only from the intended repository. No known exploits are currently reported in the wild, but the potential impact warrants immediate remediation.
Potential Impact
The vulnerability poses significant risks to organizations using LangChain versions up to 0.1.10. Disclosure of API keys can lead to unauthorized use of large language model services, resulting in data leakage, financial loss, and service disruption. Remote code execution could allow attackers to execute arbitrary commands on affected systems, potentially leading to full system compromise, lateral movement, and persistent access. Given LangChain's role in AI application development, exploitation could also undermine the integrity of AI workflows and data confidentiality. Organizations relying on LangChain for production or development environments face risks of intellectual property theft, data breaches, and operational disruption. The vulnerability's network accessibility and low complexity of exploitation increase the likelihood of targeted attacks, especially in environments where attackers have some level of access or control over input parameters.
Mitigation Recommendations
Organizations should immediately upgrade to langchain-core version 0.1.29 or later, which contains the patch that properly restricts path traversal in the load_chain function. Until upgrading, restrict access to the load_chain functionality to trusted users and environments only. Implement strict input validation and sanitization on path parameters to prevent directory traversal sequences. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with rules to detect and block directory traversal attempts. Monitor logs for suspicious access patterns involving '../' sequences or unexpected file access. Limit the permissions of the application process to the minimum necessary, preventing access to sensitive files and directories. Rotate any potentially exposed API keys and enforce usage monitoring and anomaly detection on large language model service accounts. Conduct security reviews of AI application configurations to detect unauthorized changes or malicious payloads.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-03T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d89b7ef31ef0b587fa4
Added to database: 2/25/2026, 9:45:45 PM
Last enriched: 2/26/2026, 7:28:26 PM
Last updated: 4/12/2026, 1:57:21 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.