Skip to content

chore(deps): update dependency langchain-core to v1.2.22 [security]#262

Open
a-klos wants to merge 1 commit intomainfrom
renovate/pypi-langchain-core-vulnerability
Open

chore(deps): update dependency langchain-core to v1.2.22 [security]#262
a-klos wants to merge 1 commit intomainfrom
renovate/pypi-langchain-core-vulnerability

Conversation

@a-klos
Copy link
Copy Markdown
Member

@a-klos a-klos commented Feb 15, 2026

This PR contains the following updates:

Package Change Age Confidence
langchain-core (changelog) 1.2.13 -> 1.2.22 age confidence
langchain-core (changelog) 1.2.7 -> 1.2.22 age confidence

GitHub Vulnerability Alerts

CVE-2026-34070

Summary

Multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directory traversal or absolute path injection. When an application passes user-influenced prompt configurations to load_prompt() or load_prompt_from_config(), an attacker can read arbitrary files on the host filesystem, constrained only by file-extension checks (.txt for templates, .json/.yaml for examples).

Note: The affected functions (load_prompt, load_prompt_from_config, and the .save() method on prompt classes) are undocumented legacy APIs. They are superseded by the dumpd/dumps/load/loads serialization APIs in langchain_core.load, which do not perform filesystem reads and use an allowlist-based security model. As part of this fix, the legacy APIs have been formally deprecated and will be removed in 2.0.0.

Affected component

Package: langchain-core
File: langchain_core/prompts/loading.py
Affected functions: _load_template(), _load_examples(), _load_few_shot_prompt()

Severity

High

The score reflects the file-extension constraints that limit which files can be read.

Vulnerable code paths

Config key Loaded by Readable extensions
template_path, suffix_path, prefix_path _load_template() .txt
examples (when string) _load_examples() .json, .yaml, .yml
example_prompt_path _load_few_shot_prompt() .json, .yaml, .yml

None of these code paths validated the supplied path against absolute path injection or .. traversal sequences before reading from disk.

Impact

An attacker who controls or influences the prompt configuration dict can read files outside the intended directory:

  • .txt files: cloud-mounted secrets (/mnt/secrets/api_key.txt), requirements.txt, internal system prompts
  • .json/.yaml files: cloud credentials (~/.docker/config.json, ~/.azure/accessTokens.json), Kubernetes manifests, CI/CD configs, application settings

This is exploitable in applications that accept prompt configs from untrusted sources, including low-code AI builders and API wrappers that expose load_prompt_from_config().

Proof of concept

from langchain_core.prompts.loading import load_prompt_from_config

# Reads /tmp/secret.txt via absolute path injection
config = {
    "_type": "prompt",
    "template_path": "/tmp/secret.txt",
    "input_variables": [],
}
prompt = load_prompt_from_config(config)
print(prompt.template)  # file contents disclosed

# Reads ../../etc/secret.txt via directory traversal
config = {
    "_type": "prompt",
    "template_path": "../../etc/secret.txt",
    "input_variables": [],
}
prompt = load_prompt_from_config(config)

# Reads arbitrary .json via few-shot examples
config = {
    "_type": "few_shot",
    "examples": "../../../../.docker/config.json",
    "example_prompt": {
        "_type": "prompt",
        "input_variables": ["input", "output"],
        "template": "{input}: {output}",
    },
    "prefix": "",
    "suffix": "{query}",
    "input_variables": ["query"],
}
prompt = load_prompt_from_config(config)

Mitigation

Update langchain-core to >= 1.2.22.

The fix adds path validation that rejects absolute paths and .. traversal sequences by default. An allow_dangerous_paths=True keyword argument is available on load_prompt() and load_prompt_from_config() for trusted inputs.

As described above, these legacy APIs have been formally deprecated. Users should migrate to dumpd/dumps/load/loads from langchain_core.load.

Credit


Configuration

📅 Schedule: Branch creation - "" in timezone UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@a-klos a-klos added python Pull requests that update python code renovate labels Feb 15, 2026
@a-klos a-klos force-pushed the renovate/pypi-langchain-core-vulnerability branch 3 times, most recently from 1c507e7 to 6fd078a Compare February 22, 2026 02:04
@a-klos a-klos force-pushed the renovate/pypi-langchain-core-vulnerability branch 4 times, most recently from 542ad1f to df784b9 Compare March 8, 2026 02:04
@a-klos a-klos force-pushed the renovate/pypi-langchain-core-vulnerability branch 2 times, most recently from a5368aa to 8741b4a Compare March 22, 2026 02:09
@a-klos a-klos force-pushed the renovate/pypi-langchain-core-vulnerability branch from 8741b4a to 6e746f2 Compare March 29, 2026 02:25
@a-klos a-klos changed the title chore(deps): update dependency langchain-core to v1.2.11 [security] chore(deps): update dependency langchain-core to v1.2.22 [security] Mar 29, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

python Pull requests that update python code renovate

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants