Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25528: CWE-918: Server-Side Request Forgery (SSRF) in langchain-ai langsmith-sdk

0
Medium
VulnerabilityCVE-2026-25528cvecve-2026-25528cwe-918
Published: Mon Feb 09 2026 (02/09/2026, 20:08:32 UTC)
Source: CVE Database V5
Vendor/Project: langchain-ai
Product: langsmith-sdk

Description

CVE-2026-25528 is a Server-Side Request Forgery (SSRF) vulnerability in the langchain-ai langsmith-sdk affecting versions >= 0. 4. 10 and < 0. 6. 3. The vulnerability arises from the SDK's distributed tracing feature, which accepts unvalidated api_url values injected via the baggage HTTP header. An attacker can exploit this by injecting malicious URLs, causing the SDK to send sensitive trace data to attacker-controlled endpoints. This flaw affects both the Python and JavaScript SDKs prior to versions 0. 6. 3 and 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/17/2026, 09:46:06 UTC

Technical Analysis

The langchain-ai langsmith-sdk provides client SDKs for interacting with the LangSmith platform, including a distributed tracing feature that processes incoming HTTP headers to reconstruct trace data. Specifically, the SDK parses the baggage header, which can contain configuration parameters such as api_url and api_key for replica endpoints. In affected versions (>= 0.4.10 and < 0.6.3 for Python, and similarly for JavaScript), these parameters are accepted without validation. An attacker can craft malicious HTTP requests with a specially crafted baggage header containing arbitrary api_url values. When the traced operation completes, the SDK’s post() and patch() methods send run data to all configured replica URLs, including those injected by the attacker. This results in Server-Side Request Forgery (SSRF), where the SDK makes HTTP requests to attacker-controlled endpoints, potentially exfiltrating sensitive trace data. The vulnerability is classified as CWE-918 (SSRF). It affects confidentiality by leaking trace data but does not impact integrity or availability. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. The issue was addressed in Python SDK version 0.6.3 and JavaScript SDK version 0.4.6 by validating or restricting the api_url values parsed from headers. No known active exploits have been reported, but the vulnerability’s nature warrants prompt remediation.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive trace data leakage, which may include operational metadata, internal service endpoints, or other telemetry that could aid attackers in reconnaissance or further attacks. Organizations using the langsmith-sdk for distributed tracing in internal or customer-facing applications could inadvertently expose this data to malicious actors. Although the vulnerability does not directly compromise system integrity or availability, the confidentiality breach could violate data protection regulations such as GDPR if personal or sensitive information is included in traces. This could lead to regulatory penalties and reputational damage. Additionally, the SSRF could be leveraged as a pivot point for further internal network attacks if the attacker-controlled endpoints are used to probe or exploit internal services. The medium severity rating reflects moderate risk, but the ease of exploitation without authentication increases urgency for organizations relying on these SDK versions.

Mitigation Recommendations

European organizations should immediately upgrade langsmith-sdk to at least version 0.6.3 for Python and 0.4.6 for JavaScript to ensure the vulnerability is patched. Until upgrades can be applied, organizations should implement strict network egress filtering to prevent the SDK from making outbound HTTP requests to untrusted or external endpoints, especially those not explicitly whitelisted. Monitoring and logging of outbound requests from applications using the SDK can help detect anomalous traffic indicative of exploitation attempts. Additionally, organizations should audit their use of distributed tracing and the baggage header to ensure that untrusted input is not accepted or propagated. Applying Web Application Firewall (WAF) rules to detect and block suspicious baggage header values may provide temporary mitigation. Finally, review trace data for any signs of exfiltration and conduct a security assessment of internal services exposed via tracing to identify any further risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.373Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a44144b57a58fa16f3272

Added to database: 2/9/2026, 8:31:16 PM

Last enriched: 2/17/2026, 9:46:06 AM

Last updated: 3/27/2026, 1:14:44 AM

Views: 186

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses