
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical security vulnerability (CVE-2023-36188) was discovered in langchain version 0.0.64, allowing remote attackers to execute arbitrary code via the PALChain parameter in the Python exec method. The vulnerability was disclosed on July 6, 2023, and received a CVSS v3.1 base score of 9.8 (CRITICAL) (NVD).
The vulnerability exists in the PALChain component of langchain, which allows for prompt injection that can lead to arbitrary code execution. The issue stems from insufficient validation of user inputs in the Python execution environment. The vulnerability received a CVSS vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (NVD).
The vulnerability allows attackers to execute arbitrary code on affected systems through the PALChain parameter. This could lead to complete system compromise, as successful exploitation provides attackers with the ability to execute malicious code with the same privileges as the application running langchain (NVD, GitHub Issue).
The vulnerability was addressed through a security patch that implements several protective measures: preventing imports, blocking arbitrary execution commands, enforcing execution time limits, and validating solution expressions in the code. These mitigations were implemented using AST-based code analysis and additional security controls (GitHub PR).
The security community actively discussed the vulnerability, with researchers noting that while the implemented AST-based Python sandbox mitigations make attacks more complex, they may not provide complete protection against sophisticated bypass techniques. The development team acknowledged these limitations and added warning messages to alert users about the potential risks of code execution (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."