Output Redaction Flaw in LangSmith Client SDKs for JavaScript and Python
CVE-2026-41182

5.3MEDIUM

Key Information:

Vendor
CVE Published:
23 April 2026

What is CVE-2026-41182?

LangSmith Client SDKs for JavaScript and Python experienced a significant flaw related to output redaction controls, specifically affecting the handling of streaming token events. Prior to the introduction of version 0.5.19 for the JavaScript SDK and version 0.7.31 for the Python SDK, output redaction mechanisms were ineffective during live token streams. As a consequence, sensitive information produced by large language model (LLM) outputs could inadvertently be exposed, as these streams bypassed the designated redaction processes entirely. This oversight presents a serious risk for applications utilizing LangSmith SDKs that depend on effective output management to safeguard sensitive LLM data.

Affected Version(s)

langsmith-sdk < 0.5.19 < 0.5.19

langsmith-sdk < 0.7.31 < 0.7.31

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.