CVE-2026-25750: langsmith: security flaw enables exploitation
HIGHAny organization running LangSmith — cloud or self-hosted — for monitoring LangChain/AI agent pipelines is exposed until upgraded to Helm chart 0.12.71. A single phishing link harvests a bearer token granting full workspace access: traces, prompts, datasets, and any credentials embedded in LLM call logs. Upgrade immediately; if self-hosted, treat this as a critical patch given the direct path to AI pipeline exfiltration.
Risk Assessment
HIGH. CVSS 8.1 is appropriate. Exploitability is realistic: attack complexity is low, no privileges required, and phishing is a baseline capability for any threat actor. The 5-minute token TTL limits opportunistic mass exploitation but does not protect against targeted attacks — an attacker with a prepared exfiltration endpoint and a credible lure can execute the full kill chain in under 60 seconds. LangSmith workspaces routinely contain LLM traces that include API keys, PII, internal prompts, and proprietary model behavior data, making this a high-value target beyond simple account takeover. Self-hosted deployments have no automatic patch delivery, increasing exposure window significantly.
Affected Systems
Severity & Risk
Attack Surface
Recommended Action
7 steps-
PATCH
Upgrade langchain-ai/helm to >= 0.12.71 immediately. For self-hosted, this is the only fix — no workaround exists per vendor advisory.
-
AUDIT
Review LangSmith workspace access logs for any anomalous API calls originating from unexpected IPs in the past 90 days.
-
ROTATE
Rotate all LangSmith API keys and user tokens as a precaution.
-
SCAN TRACES
Audit recent LangSmith traces for inadvertently logged credentials, PII, or sensitive prompts that may now be considered compromised.
-
PHISHING DEFENSE
Brief development and ML teams on this specific attack vector — malicious LangSmith URLs are indistinguishable from legitimate ones without inspecting the baseUrl parameter.
-
DETECTION
Alert on LangSmith authentication from new geographies or user agents within the 5-minute token validity window.
-
ZERO-TRUST: Enforce network-level restrictions on LangSmith instances (allowlist known CI/CD and developer IPs).
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-25750?
Any organization running LangSmith — cloud or self-hosted — for monitoring LangChain/AI agent pipelines is exposed until upgraded to Helm chart 0.12.71. A single phishing link harvests a bearer token granting full workspace access: traces, prompts, datasets, and any credentials embedded in LLM call logs. Upgrade immediately; if self-hosted, treat this as a critical patch given the direct path to AI pipeline exfiltration.
Is CVE-2026-25750 actively exploited?
No confirmed active exploitation of CVE-2026-25750 has been reported, but organizations should still patch proactively.
How to fix CVE-2026-25750?
1. PATCH: Upgrade langchain-ai/helm to >= 0.12.71 immediately. For self-hosted, this is the only fix — no workaround exists per vendor advisory. 2. AUDIT: Review LangSmith workspace access logs for any anomalous API calls originating from unexpected IPs in the past 90 days. 3. ROTATE: Rotate all LangSmith API keys and user tokens as a precaution. 4. SCAN TRACES: Audit recent LangSmith traces for inadvertently logged credentials, PII, or sensitive prompts that may now be considered compromised. 5. PHISHING DEFENSE: Brief development and ML teams on this specific attack vector — malicious LangSmith URLs are indistinguishable from legitimate ones without inspecting the baseUrl parameter. 6. DETECTION: Alert on LangSmith authentication from new geographies or user agents within the 5-minute token validity window. 7. ZERO-TRUST: Enforce network-level restrictions on LangSmith instances (allowlist known CI/CD and developer IPs).
What systems are affected by CVE-2026-25750?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, LLM observability and monitoring pipelines, RAG pipelines, model evaluation and fine-tuning pipelines, MLOps/LLMOps infrastructure, Kubernetes-based AI deployments.
What is the CVSS score for CVE-2026-25750?
CVE-2026-25750 has a CVSS v3.1 base score of 8.1 (HIGH). The EPSS exploitation probability is 0.04%.
Technical Details
NVD Description
Langchain Helm Charts are Helm charts for deploying Langchain applications on Kubernetes. Prior to langchain-ai/helm version 0.12.71, a URL parameter injection vulnerability existed in LangSmith Studio that could allow unauthorized access to user accounts through stolen authentication tokens. The vulnerability affected both LangSmith Cloud and self-hosted deployments. Authenticated LangSmith users who clicked on a specially crafted malicious link would have their bearer token, user ID, and workspace ID transmitted to an attacker-controlled server. With this stolen token, an attacker could impersonate the victim and access any LangSmith resources or perform any actions the user was authorized to perform within their workspace. The attack required social engineering (phishing, malicious links in emails or chat applications) to convince users to click the crafted URL. The stolen tokens expired after 5 minutes, though repeated attacks against the same user were possible if they could be convinced to click malicious links multiple times. The fix in version 0.12.71 implements validation requiring user-defined allowed origins for the baseUrl parameter, preventing tokens from being sent to unauthorized servers. No known workarounds are available. Self-hosted customers must upgrade to the patched version.
Exploitation Scenario
A threat actor targeting an organization's AI pipeline begins by identifying LangSmith usage via job postings referencing LangChain or public GitHub repositories. The attacker registers a lookalike domain (e.g., langsmith-security-notice.com) and sets up a token capture endpoint. They craft a LangSmith URL with the vulnerable baseUrl parameter pointing to their server and embed it in a spearphishing email: 'Action required: your LangSmith workspace has been flagged for unusual activity — verify your account.' A developer or ML engineer clicks the link; their browser silently transmits the bearer token, user ID, and workspace ID to the attacker's server. Within 5 minutes, the attacker authenticates to LangSmith, exports all traces (extracting embedded OpenAI/Anthropic API keys from logged headers), downloads evaluation datasets, and maps the organization's complete AI system architecture from run metadata. If the attack is detected and the token expires, the attacker can repeat the phishing attempt — the vulnerability requires no elevated access to exploit repeatedly.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N References
Timeline
Related Vulnerabilities
CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same package: langchain CVE-2023-36258 9.8 LangChain: unauthenticated RCE via code injection
Same package: langchain CVE-2023-29374 9.8 LangChain: RCE via prompt injection in LLMMathChain
Same package: langchain CVE-2023-34540 9.8 LangChain: RCE via JiraAPIWrapper crafted input
Same package: langchain CVE-2023-34541 9.8 LangChain: RCE via unsafe load_prompt deserialization
Same package: langchain
AI Threat Alert