CVE-2026-25528: CWE-918: Server-Side Request Forgery (SSRF) in langchain-ai langsmith-sdk
CVE-2026-25528 is a Server-Side Request Forgery (SSRF) vulnerability in the langchain-ai langsmith-sdk affecting versions >=0. 4. 10 and <0. 6. 3. It arises from improper validation of the 'baggage' HTTP header used in distributed tracing, allowing attackers to inject arbitrary api_url values. This causes the SDK to send sensitive trace data to attacker-controlled endpoints, potentially leaking confidential information. The vulnerability does not require authentication or user interaction and has a CVSS score of 5. 8 (medium severity). It impacts confidentiality but not integrity or availability.
AI Analysis
Technical Summary
The vulnerability CVE-2026-25528 in the langchain-ai langsmith-sdk is a Server-Side Request Forgery (SSRF) issue categorized under CWE-918. The langsmith-sdk provides client SDKs for interacting with the LangSmith platform, including distributed tracing features that parse HTTP headers to propagate trace context. Specifically, the SDK parses the 'baggage' header via RunTree.from_headers() in Python and RunTree.fromHeaders() in TypeScript. This header can contain configuration replicas including 'api_url' and 'api_key' fields. Prior to the fix, these values were accepted without validation, allowing an attacker to inject malicious 'api_url' values. When a traced operation completes, the SDK's post() and patch() methods send run data to all configured replica URLs, including any attacker-injected URLs. This behavior enables an attacker to exfiltrate sensitive trace data to endpoints they control, compromising confidentiality. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. The issue was addressed in Python SDK version 0.6.3 and JavaScript SDK version 0.4.6 by implementing validation of incoming header values to prevent injection of unauthorized URLs. No known exploits are reported in the wild as of the publication date. The CVSS 3.1 score is 5.8, reflecting medium severity with network attack vector, low attack complexity, no privileges required, no user interaction, and partial confidentiality impact. The vulnerability does not affect integrity or availability. This flaw is particularly relevant for organizations using langchain-ai's langsmith-sdk for distributed tracing in AI or software development environments, where trace data may contain sensitive operational or user information.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential leakage of sensitive trace data to attacker-controlled endpoints. Trace data often contains detailed information about application behavior, internal service calls, and potentially sensitive metadata, which could aid attackers in further reconnaissance or exploitation. Confidentiality breaches could lead to exposure of intellectual property, user data, or internal system architecture. While the vulnerability does not directly affect system integrity or availability, the exfiltration of trace data can undermine trust and compliance with data protection regulations such as GDPR. Organizations in sectors with stringent data privacy requirements, including finance, healthcare, and government, may face regulatory and reputational consequences if exploited. The ease of exploitation without authentication or user interaction increases the risk, especially in environments where distributed tracing is widely used and SDK versions are outdated. Additionally, attackers could leverage the exfiltrated data for subsequent attacks or social engineering campaigns. The lack of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.
Mitigation Recommendations
European organizations should immediately upgrade all langchain-ai langsmith-sdk instances to Python version 0.6.3 or later and JavaScript version 0.4.6 or later to incorporate the security fix. Beyond upgrading, organizations should implement strict validation and sanitization of all incoming HTTP headers used in distributed tracing to prevent injection of malicious values. Network segmentation and egress filtering can limit the ability of compromised SDKs to communicate with unauthorized external endpoints. Monitoring and logging of outgoing requests from tracing components should be enhanced to detect anomalous or unexpected destinations. Organizations should audit their distributed tracing configurations to ensure no unauthorized replica URLs are configured. Additionally, applying runtime application self-protection (RASP) or web application firewall (WAF) rules to detect and block suspicious header manipulations can provide an additional defense layer. Security teams should review trace data handling policies to minimize sensitive information exposure and ensure compliance with GDPR and other relevant regulations. Finally, developers should be trained on secure usage of tracing SDKs and the risks associated with untrusted input in distributed tracing contexts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2026-25528: CWE-918: Server-Side Request Forgery (SSRF) in langchain-ai langsmith-sdk
Description
CVE-2026-25528 is a Server-Side Request Forgery (SSRF) vulnerability in the langchain-ai langsmith-sdk affecting versions >=0. 4. 10 and <0. 6. 3. It arises from improper validation of the 'baggage' HTTP header used in distributed tracing, allowing attackers to inject arbitrary api_url values. This causes the SDK to send sensitive trace data to attacker-controlled endpoints, potentially leaking confidential information. The vulnerability does not require authentication or user interaction and has a CVSS score of 5. 8 (medium severity). It impacts confidentiality but not integrity or availability.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-25528 in the langchain-ai langsmith-sdk is a Server-Side Request Forgery (SSRF) issue categorized under CWE-918. The langsmith-sdk provides client SDKs for interacting with the LangSmith platform, including distributed tracing features that parse HTTP headers to propagate trace context. Specifically, the SDK parses the 'baggage' header via RunTree.from_headers() in Python and RunTree.fromHeaders() in TypeScript. This header can contain configuration replicas including 'api_url' and 'api_key' fields. Prior to the fix, these values were accepted without validation, allowing an attacker to inject malicious 'api_url' values. When a traced operation completes, the SDK's post() and patch() methods send run data to all configured replica URLs, including any attacker-injected URLs. This behavior enables an attacker to exfiltrate sensitive trace data to endpoints they control, compromising confidentiality. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. The issue was addressed in Python SDK version 0.6.3 and JavaScript SDK version 0.4.6 by implementing validation of incoming header values to prevent injection of unauthorized URLs. No known exploits are reported in the wild as of the publication date. The CVSS 3.1 score is 5.8, reflecting medium severity with network attack vector, low attack complexity, no privileges required, no user interaction, and partial confidentiality impact. The vulnerability does not affect integrity or availability. This flaw is particularly relevant for organizations using langchain-ai's langsmith-sdk for distributed tracing in AI or software development environments, where trace data may contain sensitive operational or user information.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential leakage of sensitive trace data to attacker-controlled endpoints. Trace data often contains detailed information about application behavior, internal service calls, and potentially sensitive metadata, which could aid attackers in further reconnaissance or exploitation. Confidentiality breaches could lead to exposure of intellectual property, user data, or internal system architecture. While the vulnerability does not directly affect system integrity or availability, the exfiltration of trace data can undermine trust and compliance with data protection regulations such as GDPR. Organizations in sectors with stringent data privacy requirements, including finance, healthcare, and government, may face regulatory and reputational consequences if exploited. The ease of exploitation without authentication or user interaction increases the risk, especially in environments where distributed tracing is widely used and SDK versions are outdated. Additionally, attackers could leverage the exfiltrated data for subsequent attacks or social engineering campaigns. The lack of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.
Mitigation Recommendations
European organizations should immediately upgrade all langchain-ai langsmith-sdk instances to Python version 0.6.3 or later and JavaScript version 0.4.6 or later to incorporate the security fix. Beyond upgrading, organizations should implement strict validation and sanitization of all incoming HTTP headers used in distributed tracing to prevent injection of malicious values. Network segmentation and egress filtering can limit the ability of compromised SDKs to communicate with unauthorized external endpoints. Monitoring and logging of outgoing requests from tracing components should be enhanced to detect anomalous or unexpected destinations. Organizations should audit their distributed tracing configurations to ensure no unauthorized replica URLs are configured. Additionally, applying runtime application self-protection (RASP) or web application firewall (WAF) rules to detect and block suspicious header manipulations can provide an additional defense layer. Security teams should review trace data handling policies to minimize sensitive information exposure and ensure compliance with GDPR and other relevant regulations. Finally, developers should be trained on secure usage of tracing SDKs and the risks associated with untrusted input in distributed tracing contexts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T19:59:47.373Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a44144b57a58fa16f3272
Added to database: 2/9/2026, 8:31:16 PM
Last enriched: 2/9/2026, 8:45:55 PM
Last updated: 2/9/2026, 10:58:03 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25951: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in frangoteam FUXA
HighCVE-2026-25895: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in frangoteam FUXA
CriticalCVE-2026-25894: CWE-321: Use of Hard-coded Cryptographic Key in frangoteam FUXA
CriticalCVE-2026-25893: CWE-285: Improper Authorization in frangoteam FUXA
CriticalCVE-2026-25939: CWE-862: Missing Authorization in frangoteam FUXA
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.