Metrics
Affected Vendors & Products
Wed, 21 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain
Langchain langchain |
|
| CPEs | cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Langchain
Langchain langchain |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 14 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 13 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain-ai
Langchain-ai langchain |
|
| Vendors & Products |
Langchain-ai
Langchain-ai langchain |
Mon, 12 Jan 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LangChain versions up to and including 0.3.1 contain a regular expression denial-of-service (ReDoS) vulnerability in the MRKLOutputParser.parse() method (libs/langchain/langchain/agents/mrkl/output_parser.py). The parser applies a backtracking-prone regular expression when extracting tool actions from model output. An attacker who can supply or influence the parsed text (for example via prompt injection in downstream applications that pass LLM output directly into MRKLOutputParser.parse()) can trigger excessive CPU consumption by providing a crafted payload, causing significant parsing delays and a denial-of-service condition. | |
| Title | LangChain <= 0.3.1 MRKLOutputParser ReDoS | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-12T23:05:00.801Z
Updated: 2026-01-13T16:21:35.172Z
Reserved: 2026-01-09T20:28:41.285Z
Link: CVE-2024-58340
Updated: 2026-01-13T16:21:30.936Z
Status : Analyzed
Published: 2026-01-12T23:15:51.780
Modified: 2026-01-21T17:57:56.537
Link: CVE-2024-58340