CVE-2024-5998:
LangChain pickle deserialization of untrusted data
5.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.4145%
CWE
Published
9/17/2024
Updated
11/18/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
langchain-community | pip | < 0.2.4 | 0.2.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly references FAISS.deserialize_from_bytes as the entry point for unsafe deserialization. The commit diff shows this function previously lacked safeguards against untrusted pickle data, directly using pickle.loads(serialized). The CWE-502 alignment and the patch's introduction of an opt-in parameter confirm the function's role in the vulnerability.