CVE-2026-41488 - angchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding
CVE ID :CVE-2026-41488
Published : April 24, 2026, 9:16 p.m. | 2 hours, 57 minutes ago
Description :LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with independent DNS resolution. This left a TOCTOU / DNS rebinding window: an attacker-controlled hostname could resolve to a public IP during validation and then to a private/localhost IP during the actual fetch.
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : April 24, 2026, 9:16 p.m. | 2 hours, 57 minutes ago
Description :LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with independent DNS resolution. This left a TOCTOU / DNS rebinding window: an attacker-controlled hostname could resolve to a public IP during validation and then to a private/localhost IP during the actual fetch.
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...