Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @langchain/community
  4. ›
  5. CVE-2024-7042

CVE-2024-7042: @langchain/community SQL Injection vulnerability

October 29, 2024 (updated November 1, 2024)

A vulnerability in the GraphCypherQAChain class of langchain-ai/langchainjs versions 0.2.5 and all versions with this class allows for prompt injection, leading to SQL injection. This vulnerability permits unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database.

References

  • github.com/advisories/GHSA-6m59-8fmv-m5f9
  • github.com/langchain-ai/langchainjs
  • github.com/langchain-ai/langchainjs/commit/615b9d9ab30a2d23a2f95fb8d7acfdf4b41ad7a6
  • github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-114.yaml
  • huntr.com/bounties/b612defb-1104-4fff-9fef-001ab07c7b2d
  • nvd.nist.gov/vuln/detail/CVE-2024-7042

Code Behaviors & Features

Detect and mitigate CVE-2024-7042 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.3.3

Fixed versions

  • 0.3.3

Solution

Upgrade to version 0.3.3 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

npm/@langchain/community/CVE-2024-7042.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:54 +0000.