Skip to main content
Mallory

SSRF and XSS Vulnerability Disclosures in LeafKit and LangChain Community

open-source-dependency-vulnerabilityinternet-facing-service-vulnerabilitycloud-service-vulnerability
Updated March 21, 2026 at 02:23 PM2 sources
Share:
SSRF and XSS Vulnerability Disclosures in LeafKit and LangChain Community

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Multiple application-layer vulnerabilities were disclosed across popular developer components, including an XSS escaping bypass in LeafKit (Vapor’s Swift templating engine) and an SSRF bypass in @langchain/community. Vapor released an updated LeafKit version to address an HTML escaping flaw where Unicode extended grapheme clusters could bypass escaping in Leaf templates: Swift treats certain sequences as a single character while browsers parse them as multiple characters, enabling attackers to break out of HTML attributes and inject malicious attributes/scripts. The issue was reported by bawolff and fixed in a LeafKit release referenced by Vapor’s advisory.

Separately, @langchain/community was reported vulnerable to CVE-2026-26019 (also tracked as GHSA-gf3v-fwqg-4vh7), affecting versions ≤ 1.1.13 and fixed in 1.1.14. The flaw sits in RecursiveUrlLoader, where a non-semantic String.startsWith() check could be bypassed with crafted hostnames (e.g., https://example.com.attacker.com), and where insufficient filtering allowed access to private/reserved IP ranges and cloud metadata endpoints such as 169.254.169.254, potentially exposing IAM credentials/tokens in cloud-hosted deployments. A separate write-up describes a different SSRF scenario involving a misconfigured Sentry tunnel endpoint and provides general SSRF background, but it does not appear to be part of the same LeafKit or LangChain disclosure.

Timeline

  1. Feb 18, 2026

    Vapor publishes LeafKit XSS vulnerability post

    The Vapor Blog published a post about a LeafKit HTML escaping vulnerability. No further details were provided in the reference content to extract additional distinct events.

  2. Feb 17, 2026

    LangChain fixes CVE-2026-26019 in version 1.1.14

    LangChain addressed the SSRF bypass in @langchain/community version 1.1.14 by adding strict origin validation with the URL API and SSRF filtering utilities to block private, loopback, metadata, and non-HTTP(S) targets. Users unable to upgrade were advised to avoid untrusted content and isolate RecursiveUrlLoader from internal networks.

  3. Feb 17, 2026

    LangChain Community SSRF bypass vulnerability identified

    A server-side request forgery bypass flaw affecting @langchain/community versions up to 1.1.13 was identified and assigned CVE-2026-26019. The issue involved RecursiveUrlLoader domain validation using startsWith() and inadequate blocking of private and reserved IP ranges, allowing access to internal services and cloud metadata endpoints.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

February 18, 2026 at 12:00 AM

Related Stories

LangChain Flaws Enable Information Disclosure and Security Bypass

LangChain Flaws Enable Information Disclosure and Security Bypass

German CERT advisories disclosed two vulnerabilities in **LangChain**, warning that the framework is affected by flaws that can lead to **information disclosure** and the **bypassing of security measures**. The issues were published in separate notices, identified as `2026-0877` and `2026-1010`, indicating multiple security weaknesses affecting the widely used LLM application framework. The advisories provide limited public detail, but the reported impact suggests attackers could expose sensitive data and circumvent protections built into LangChain-based deployments. Organizations using LangChain should review the affected advisories, identify exposed implementations, and prioritize vendor guidance, patching, and compensating controls to reduce the risk of data exposure and weakened application security.

6 days ago
LangChain Serialization Injection Vulnerabilities Enable Secret Extraction

LangChain Serialization Injection Vulnerabilities Enable Secret Extraction

Two critical serialization injection vulnerabilities were discovered in the LangChain framework, which is widely used for building LLM-powered applications. The first vulnerability (CVE-2025-68665) affects the `toJSON()` method in LangChain JS and related serialization routines, where user-controlled data containing the reserved `lc` key could be misinterpreted as legitimate LangChain objects during deserialization. The second vulnerability (CVE-2025-68664) impacts the `dumps()` and `dumpd()` functions, allowing attacker-supplied dictionaries with the `lc` key to be treated as internal objects, potentially leading to the extraction of secrets or the instantiation of internal classes with attacker-defined parameters. Both vulnerabilities are remotely exploitable and have been patched in recent versions of LangChain and LangChain Core. Exploitation of these flaws could allow attackers to extract sensitive information such as environment variables or manipulate application behavior by injecting malicious data structures. Organizations using affected versions of LangChain are strongly advised to upgrade to the patched releases—@langchain/core versions 0.3.80 and 1.1.8, langchain versions 0.3.37 and 1.2.3 for CVE-2025-68665, and langchain-core 0.3.81 and 1.2.5 for CVE-2025-68664—to mitigate the risk of exploitation.

1 months ago
Cross-Site Scripting Vulnerabilities in SiYuan, Angular, and @leanprover/unicode-input-component

Cross-Site Scripting Vulnerabilities in SiYuan, Angular, and @leanprover/unicode-input-component

Multiple newly reported **cross-site scripting (XSS)** vulnerabilities affect unrelated software products, including **SiYuan**, **Angular**, and **@leanprover/unicode-input-component**. In SiYuan, incomplete SVG sanitization can let an unauthenticated attacker deliver a crafted URL that executes arbitrary JavaScript in the application's origin, enabling theft of session tokens, cookies, and API keys, as well as unauthorized access to notes, document contents, and configuration data. In Electron-based deployments, the impact may escalate to **remote code execution** if insecure web preferences such as `nodeIntegration` are enabled or `contextIsolation` is disabled. Angular disclosed a separate XSS flaw, tracked as **CVE-2026-32635**, caused by a sanitization bypass involving internationalized security-sensitive attributes such as `href` when combined with untrusted data binding; fixed versions include `22.0.0-next.3`, `21.2.4`, `20.3.18`, and `19.2.20`. A third, distinct issue, **CVE-2026-32732**, affects **@leanprover/unicode-input-component** and allows arbitrary JavaScript execution in a victim's browser session, potentially enabling session abuse, data access, and unauthorized backend requests. These are separate vulnerability disclosures rather than a single coordinated incident, and the content is substantive security reporting rather than fluff.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.