Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 22 Jan 2026 03:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain
Langchain langchain |
|
| CPEs | cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Langchain
Langchain langchain |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 14 Jan 2026 09:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 14 Jan 2026 02:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 18:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain-ai
Langchain-ai langchain |
|
| Vendors & Products |
Langchain-ai
Langchain-ai langchain |
Tue, 13 Jan 2026 08:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LangChain versions up to and including 0.3.1 contain a regular expression denial-of-service (ReDoS) vulnerability in the MRKLOutputParser.parse() method (libs/langchain/langchain/agents/mrkl/output_parser.py). The parser applies a backtracking-prone regular expression when extracting tool actions from model output. An attacker who can supply or influence the parsed text (for example via prompt injection in downstream applications that pass LLM output directly into MRKLOutputParser.parse()) can trigger excessive CPU consumption by providing a crafted payload, causing significant parsing delays and a denial-of-service condition. | |
| Title | LangChain <= 0.3.1 MRKLOutputParser ReDoS | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-13T16:21:35.172Z
Reserved: 2026-01-09T20:28:41.285Z
Link: CVE-2024-58340
Updated: 2026-01-13T16:21:30.936Z
Status : Analyzed
Published: 2026-01-12T23:15:51.780
Modified: 2026-01-21T17:57:56.537
Link: CVE-2024-58340
OpenCVE Enrichment
Updated: 2026-01-13T18:27:24Z