CVE-2024-5998

A vulnerability in the FAISS.deserialize_from_bytes function of langchain-ai/langchain allows for pickle deserialization of untrusted data. This can lead to the execution of arbitrary commands via the os.system function. The issue affects the latest version of the product.
Configurations

Configuration 1 (hide)

cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*

History

30 Jul 2025, 16:22

Type Values Removed Values Added
CPE cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-502
First Time Langchain langchain
Langchain
References () https://huntr.com/bounties/fa3a2753-57c3-4e08-a176-d7a3ffda28fe - () https://huntr.com/bounties/fa3a2753-57c3-4e08-a176-d7a3ffda28fe - Exploit, Third Party Advisory
References () https://github.com/langchain-ai/langchain/commit/604dfe2d99246b0c09f047c604f0c63eafba31e7 - () https://github.com/langchain-ai/langchain/commit/604dfe2d99246b0c09f047c604f0c63eafba31e7 - Patch

17 Sep 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-17 12:15

Updated : 2025-07-30 16:22


NVD link : CVE-2024-5998

Mitre link : CVE-2024-5998


JSON object : View

Products Affected

langchain

  • langchain
CWE

No CWE.