-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| langchain | pip | < 0.0.308 | 0.0.308 |
| numexpr | pip | < 2.8.5 | 2.8.5 |
The vulnerability stems from numexpr's evaluate function using eval() on unsanitized input. The commit 4b2d89c in numexpr added regex-based input validation (_forbidden_re) to block dangerous characters (;,:, __, [), confirming the pre-patch evaluate function was vulnerable. Langchain's LLMMathChain used this vulnerable evaluate implementation, allowing attackers to execute code via crafted math expressions. Both the low-level expression parser (stringToExpression) and the public evaluate API are implicated.
Ongoing coverage of React2Shell