Server-Side Request Forgery Vulnerability in LangChain Framework by LangChain AI
CVE-2026-26013

3.7LOW

Key Information:

Status
Vendor
CVE Published:
10 February 2026

What is CVE-2026-26013?

The LangChain framework, designed for building agents and LLM-powered applications, has a vulnerability in the ChatOpenAI.get_num_tokens_from_messages() method. This method inadequately validates image_url inputs, potentially allowing attackers to conduct Server-Side Request Forgery (SSRF) attacks by submitting malicious image URLs. This flaw can compromise the security of applications utilizing this framework. The issue has been addressed in version 1.2.11 of LangChain.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

langchain < 1.2.11

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.