Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 27 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain-ai
Langchain-ai langchain |
|
| Vendors & Products |
Langchain-ai
Langchain-ai langchain |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with independent DNS resolution. This left a TOCTOU / DNS rebinding window: an attacker-controlled hostname could resolve to a public IP during validation and then to a private/localhost IP during the actual fetch. | |
| Title | angchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-27T13:40:42.065Z
Reserved: 2026-04-20T16:14:19.007Z
Link: CVE-2026-41488
Updated: 2026-04-27T13:40:38.447Z
Status : Awaiting Analysis
Published: 2026-04-24T21:16:19.637
Modified: 2026-04-27T18:57:20.293
Link: CVE-2026-41488
No data.
OpenCVE Enrichment
Updated: 2026-04-27T20:15:12Z