
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2024-8309) was discovered in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 that allows for SQL injection through prompt injection. The vulnerability was disclosed on October 29, 2024, and affects the langchain package version 0.2.5 (NVD).
The vulnerability exists in the GraphCypherQAChain class and allows attackers to perform SQL injection attacks through prompt injection. The issue has received a CVSS v3.1 base score of 9.8 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a critical severity level with network access vector and no required privileges or user interaction (NVD).
The vulnerability can lead to multiple severe impacts including: unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database (NVD).
A patch has been released to address this vulnerability. Users should upgrade to a patched version of the software. The fix is available in the langchain repository (Github Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."