CVE-2026-25750: Langchain Helm Charts are Helm charts for deploying Langchain applications on Kubernetes. Prior to langchain-ai/helm ver
Summary
Langchain Helm Charts (tools for deploying Langchain applications on Kubernetes, a container orchestration system) versions before 0.12.71 had a URL parameter injection vulnerability (a flaw where attackers trick the system by inserting malicious data into URLs) in LangSmith Studio that could steal user authentication tokens through phishing attacks. If a user clicked a malicious link, their bearer token (a credential proving their identity), user ID, and workspace ID would be sent to an attacker's server, allowing the attacker to impersonate them and access their LangSmith resources.
Solution / Mitigation
Upgrade to langchain-ai/helm version 0.12.71 or later. The fix implements validation requiring user-defined allowed origins for the baseUrl parameter, preventing tokens from being sent to unauthorized servers. Self-hosted customers must upgrade to the patched version.
Vulnerability Details
EPSS: 0.1%
Classification
Taxonomy References
Affected Vendors
Related Issues
CVE-2024-27444: langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-
CVE-2025-45150: Insecure permissions in LangChain-ChatGLM-Webui commit ef829 allows attackers to arbitrarily view and download sensitive
Original source: https://nvd.nist.gov/vuln/detail/CVE-2026-25750
First tracked: March 4, 2026 at 07:07 PM
Classified by LLM (prompt v3) · confidence: 95%