Langchaingo supports the use of jinja2 syntax when parsing prompts, which is in turn parsed using the gonja library v1.5.3.
Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 15 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain
Langchain langchain |
|
| Vendors & Products |
Langchain
Langchain langchain |
Fri, 12 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 12 Sep 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Langchaingo supports the use of jinja2 syntax when parsing prompts, which is in turn parsed using the gonja library v1.5.3. Gonja supports include and extends syntax to read files, which leads to a server side template injection vulnerability within langchaingo, allowing an attacker to insert a statement into a prompt to read the "etc/passwd" file. | |
| Title | CVE-2025-9556 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published: 2025-09-12T13:45:14.684Z
Updated: 2025-11-03T18:14:18.939Z
Reserved: 2025-08-27T18:10:47.686Z
Link: CVE-2025-9556
Updated: 2025-11-03T18:14:18.939Z
Status : Awaiting Analysis
Published: 2025-09-12T14:15:42.300
Modified: 2025-11-03T19:16:17.430
Link: CVE-2025-9556
No data.