Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28088: n/a

0
High
VulnerabilityCVE-2024-28088cvecve-2024-28088
Published: Sun Mar 03 2024 (03/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 19:28:26 UTC

Technical Analysis

CVE-2024-28088 is a directory traversal vulnerability affecting LangChain versions through 0.1.10. LangChain is a framework that facilitates building applications with large language models. The vulnerability exists in the load_chain function, which is designed to load configuration files from the hwchase17/langchain-hub GitHub repository. However, the implementation allows an attacker who can control the final part of the path parameter to traverse directories using '../' sequences, thereby bypassing the intended repository restriction. This improper input validation (CWE-31) enables access to arbitrary files on the host system. The consequences include disclosure of sensitive information such as API keys for large language model services, which could be used to abuse or exhaust service quotas or incur financial costs. More critically, the vulnerability may allow remote code execution if an attacker can load malicious configurations or scripts. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality and integrity, with network attack vector, low attack complexity, and requiring privileges but no user interaction. A patch addressing this vulnerability was released in langchain-core version 0.1.29, which properly restricts path traversal and enforces loading only from the intended repository. No known exploits are currently reported in the wild, but the potential impact warrants immediate remediation.

Potential Impact

The vulnerability poses significant risks to organizations using LangChain versions up to 0.1.10. Disclosure of API keys can lead to unauthorized use of large language model services, resulting in data leakage, financial loss, and service disruption. Remote code execution could allow attackers to execute arbitrary commands on affected systems, potentially leading to full system compromise, lateral movement, and persistent access. Given LangChain's role in AI application development, exploitation could also undermine the integrity of AI workflows and data confidentiality. Organizations relying on LangChain for production or development environments face risks of intellectual property theft, data breaches, and operational disruption. The vulnerability's network accessibility and low complexity of exploitation increase the likelihood of targeted attacks, especially in environments where attackers have some level of access or control over input parameters.

Mitigation Recommendations

Organizations should immediately upgrade to langchain-core version 0.1.29 or later, which contains the patch that properly restricts path traversal in the load_chain function. Until upgrading, restrict access to the load_chain functionality to trusted users and environments only. Implement strict input validation and sanitization on path parameters to prevent directory traversal sequences. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with rules to detect and block directory traversal attempts. Monitor logs for suspicious access patterns involving '../' sequences or unexpected file access. Limit the permissions of the application process to the minimum necessary, preventing access to sensitive files and directories. Rotate any potentially exposed API keys and enforce usage monitoring and anomaly detection on large language model service accounts. Conduct security reviews of AI application configurations to detect unauthorized changes or malicious payloads.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d89b7ef31ef0b587fa4

Added to database: 2/25/2026, 9:45:45 PM

Last enriched: 2/26/2026, 7:28:26 PM

Last updated: 4/12/2026, 1:57:21 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses