
Cloud Vulnerability DB
A community-led vulnerabilities database
LangChain Experimental (langchain_experimental) before version 0.1.8 contains a security vulnerability that allows attackers to bypass the previous fix for CVE-2023-44467 and execute arbitrary code. The vulnerability exists in the Python code through specific attribute access including import, subclasses, builtins, globals, getattribute, bases, mro, and base attributes, which are not properly prohibited by pal_chain/base.py (NVD).
The vulnerability stems from insufficient protection mechanisms in the PALChain component, specifically in the pal_chain/base.py file. The issue allows attackers to access dangerous Python attributes that can be used for arbitrary code execution. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating remote exploitation with no required privileges or user interaction (NVD).
If exploited, this vulnerability allows attackers to execute arbitrary code on the affected system. This could lead to complete system compromise, including unauthorized access to sensitive data, system modifications, and potential service disruptions (NVD).
The vulnerability has been fixed in LangChain Experimental version 0.1.8. Users should upgrade to this version or later to protect against this security issue. The fix includes enhanced protection against arbitrary code execution in PALChain by blocking access to dangerous Python attributes (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."