Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. langchain
  4. ›
  5. CVE-2024-7774

CVE-2024-7774: Langchain Path Traversal vulnerability

October 29, 2024 (updated November 1, 2024)

A path traversal vulnerability exists in the getFullPath method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read .txt files, and delete files. The vulnerability is exploited through the setFileContent, getParsedFile, and mdelete methods, which do not properly sanitize user input.

References

  • github.com/advisories/GHSA-hc5w-c9f8-9cc4
  • github.com/langchain-ai/langchainjs
  • github.com/langchain-ai/langchainjs/commit/a0fad77d6b569e5872bd4a9d33be0c0785e538a9
  • github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-111.yaml
  • huntr.com/bounties/8fe40685-b714-4191-af7a-3de5e5628cee
  • nvd.nist.gov/vuln/detail/CVE-2024-7774

Code Behaviors & Features

Detect and mitigate CVE-2024-7774 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.2.19

Fixed versions

  • 0.2.19

Solution

Upgrade to version 0.2.19 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-29: Path Traversal: '..filename'

Source file

npm/langchain/CVE-2024-7774.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:52 +0000.