Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-41488— angchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding

CVSS 3.1 · Low EPSS 0.02% · P7
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-41488

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
angchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding
Source: NVD (National Vulnerability Database)
Vulnerability Description
LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with independent DNS resolution. This left a TOCTOU / DNS rebinding window: an attacker-controlled hostname could resolve to a public IP during validation and then to a private/localhost IP during the actual fetch.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
LangChain 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
LangChain是LangChain开源的一个用于开发由大型语言模型 (LLM) 提供支持的应用程序的框架。 LangChain 1.1.14之前版本存在代码问题漏洞,该漏洞源于langchain-openai的_url_to_size()辅助函数在SSRF保护验证URL后,在独立的网络操作中获取URL时存在TOCTOU/DNS重新绑定窗口,攻击者控制的主机名可在验证时解析为公共IP,在获取时解析为私有/本地主机IP。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
langchain-ailangchain-openai < 1.1.14 -

II. Public POCs for CVE-2026-41488

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-41488

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-41488

No comments yet


Leave a comment