CVE-2023-44467: langchain_experimental vulnerable to arbitrary code execution via PALChain in the python exec method
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.30148%
CWE
-
Published
10/9/2023
Updated
2/24/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| langchain-experimental | pip | <= 0.0.14 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from the incomplete blocklist in COMMAND_EXECUTION_FUNCTIONS, which failed to include 'import'. This oversight allowed attackers to use 'import' in Python code executed via PALChain, bypassing the CVE-2023-36258 fix. The GitHub commit explicitly adds 'import' to this list to mitigate the issue, confirming its role in the vulnerability. The list is central to the validation logic in pal_chain/base.py, and its prior incompleteness directly enabled arbitrary code execution.