Server-side Request Forgery (SSRF) Affecting @langchain/community package, versions <1.1.14


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-LANGCHAINCOMMUNITY-15268428
  • published12 Feb 2026
  • disclosed11 Feb 2026
  • creditAnuragh K.P

Introduced: 11 Feb 2026

CVE-2026-26019  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade @langchain/community to version 1.1.14 or higher.

Overview

@langchain/community is a Third-party integrations for LangChain.js

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the RecursiveUrlLoader class. An attacker can access internal or sensitive resources by influencing crawled page content to include links that bypass origin and IP address validation, causing the process to fetch attacker-controlled or internal URLs.

Note: This is only exploitable if the process runs in an environment with access to internal networks or cloud metadata services.

Workaround

This vulnerability can be mitigated by avoiding the use of RecursiveUrlLoader on untrusted or user-influenced content, or by running the crawler in a network environment without access to cloud metadata or internal services.

CVSS Base Scores

version 4.0
version 3.1