CVE-2025-2828.yaml
1 info: 2 name: langchain 3 cve: CVE-2025-2828 4 summary: SSRF vulnerability in LangChain Community's RequestsToolkit component 5 details: | 6 A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit component of the langchain-community package (specifically, langchain_community.agent_toolkits.openapi.toolkit.RequestsToolkit) in langchain-ai/langchain version 0.0.27. This vulnerability occurs because the toolkit does not enforce restrictions on requests to remote internet addresses, allowing it to also access local addresses. As a result, an attacker could exploit this flaw to perform port scans, access local services, retrieve instance metadata from cloud environments (e.g., Azure, AWS), and interact with servers on the local network. 7 cvss: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H 8 severity: HIGH 9 security_advise: | 10 1. Upgrade to langchain-community version 0.0.28 or later 11 2. Implement network restrictions to limit outbound requests from the affected component 12 3. Monitor for unusual network activity from the affected systems 13 rule: version >= "0" && version < "0.0.28" 14 references: 15 - https://nvd.nist.gov/vuln/detail/CVE-2025-2828 16 - https://github.com/langchain-ai/langchain/commit/e188d4ecb085d4561a0be3c583d26aa9c2c3283f 17 - https://github.com/langchain-ai/langchain-community 18 - https://huntr.com/bounties/8f771040-7f34-420a-b96b-5b93d4a99afc