PyPI: langchain
CVE-2026-45134
Safety vulnerability ID: SFTY-20260513-51019
Affected versions of the LangSmith SDK package are vulnerable to Deserialization of Untrusted Data due to improper handling of prompt manifests fetched from the LangSmith Hub. The `pull_prompt` and `pull_prompt_commit` methods in Python, as well as `pullPrompt` and `pullPromptCommit` in JS/TS, deserialize prompt manifests that may contain serialized LangChain objects and model configurations controlled by external parties. An attacker can exploit this by publishing a malicious prompt to the LangSmith Hub, which, when pulled by `owner/name`, can lead to Server-side Request Forgery (SSRF), prompt injection, or behaviour manipulation by altering application configurations with attacker-supplied arguments.
Overview
LangSmith SDK: Public prompt pull deserializes untrusted manifests without trust boundary warning
Advisory
langsmith – Deserialization of Untrusted Data
How to Fix
Mitigation and Workarounds
---
Vulnerable Functions
Functions linked to known vulnerabilities.
Verified by Safety
Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.
Learn more
