CVE-2024-27444

langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute in Python code. These are not prohibited by pal_chain/base.py.
Configurations

Configuration 1 (hide)

cpe:2.3:a:langchain:langchain-experimental:*:*:*:*:*:*:*:*

History

14 Jul 2025, 18:38

Type Values Removed Values Added
CPE cpe:2.3:a:langchain:langchain-experimental:*:*:*:*:*:*:*:*
References () https://github.com/langchain-ai/langchain/commit/de9a6cdf163ed00adaf2e559203ed0a9ca2f1de7 - () https://github.com/langchain-ai/langchain/commit/de9a6cdf163ed00adaf2e559203ed0a9ca2f1de7 - Patch
First Time Langchain langchain-experimental
Langchain

Information

Published : 2024-02-26 16:28

Updated : 2025-07-14 18:38


NVD link : CVE-2024-27444

Mitre link : CVE-2024-27444

CVE.ORG link : CVE-2024-27444


JSON object : View

Products Affected

langchain

  • langchain-experimental
CWE
CWE-749

Exposed Dangerous Method or Function