CVE-2024-7774

A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.
Configurations

Configuration 1 (hide)

cpe:2.3:a:langchain:langchain.js:0.2.5:*:*:*:*:*:*:*

History

28 May 2025, 15:21

Type Values Removed Values Added
CPE cpe:2.3:a:langchain:langchain:0.2.5:*:*:*:*:*:*:* cpe:2.3:a:langchain:langchain.js:0.2.5:*:*:*:*:*:*:*
First Time Langchain langchain.js

Information

Published : 2024-10-29 13:15

Updated : 2025-05-28 15:21


NVD link : CVE-2024-7774

Mitre link : CVE-2024-7774

CVE.ORG link : CVE-2024-7774


JSON object : View

Products Affected

langchain

  • langchain.js
CWE
CWE-29

Path Traversal: '\..\filename'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')