Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-27795

Опубликовано: 25 фев. 2026
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

LangChain is a framework for building LLM-powered applications. Prior to version 1.1.8, a redirect-based Server-Side Request Forgery (SSRF) bypass exists in RecursiveUrlLoader in @langchain/community. The loader validates the initial URL but allows the underlying fetch to follow redirects automatically, which permits a transition from a safe public URL to an internal or metadata endpoint without revalidation. This is a bypass of the SSRF protections introduced in 1.1.14 (CVE-2026-26019). Users should upgrade to @langchain/community 1.1.18, which validates every redirect hop by disabling automatic redirects and re-validating Location targets before following them. In this version, automatic redirects are disabled (redirect: "manual"), each 3xx Location is resolved and validated with validateSafeUrl() before the next request, and a maximum redirect limit prevents infinite loops.

A flaw was found in @langchain/community. The RecursiveUrlLoader component, which is responsible for loading URLs, fails to revalidate URLs after following redirects. This allows an attacker to bypass existing Server-Side Request Forgery (SSRF) protections by initially providing a safe public URL that then redirects to an internal or sensitive metadata endpoint. This could lead to unauthorized information disclosure or access to internal network resources.

Отчет

This vulnerability is rated MODERATE and affects Red Hat products that use the @langchain/community package, specifically the RecursiveUrlLoader. A redirect chaining flaw allows a Server-Side Request Forgery (SSRF) bypass, enabling redirection from a validated public URL to an internal or metadata endpoint without revalidation. This could expose internal resources.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Lightspeedopenshift-lightspeed/lightspeed-service-api-rhel9Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-minimal-rhel8Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-minimal-rhel9Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-supported-rhel8Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-supported-rhel9Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-minimal-rhel8Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-minimal-rhel9Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-supported-rhel8Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-supported-rhel9Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/lightspeed-rhel8Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2442693langchain-core: @langchain/community: Server-Side Request Forgery (SSRF) bypass via redirect manipulation

EPSS

Процентиль: 9%
0.00032
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.1
nvd
около 1 месяца назад

LangChain is a framework for building LLM-powered applications. Prior to version 1.1.8, a redirect-based Server-Side Request Forgery (SSRF) bypass exists in `RecursiveUrlLoader` in `@langchain/community`. The loader validates the initial URL but allows the underlying fetch to follow redirects automatically, which permits a transition from a safe public URL to an internal or metadata endpoint without revalidation. This is a bypass of the SSRF protections introduced in 1.1.14 (CVE-2026-26019). Users should upgrade to `@langchain/community` 1.1.18, which validates every redirect hop by disabling automatic redirects and re-validating `Location` targets before following them. In this version, automatic redirects are disabled (`redirect: "manual"`), each 3xx `Location` is resolved and validated with `validateSafeUrl()` before the next request, and a maximum redirect limit prevents infinite loops.

CVSS3: 4.1
github
около 1 месяца назад

LangChain Community: redirect chaining can lead to SSRF bypass via RecursiveUrlLoader

EPSS

Процентиль: 9%
0.00032
Низкий

6.5 Medium

CVSS3