{"id":"CVE-2023-36095","details":"An issue in Harrison Chase langchain v.0.0.194 allows an attacker to execute arbitrary code via the python exec calls in the PALChain, affected functions include from_math_prompt and from_colored_object_prompt.","aliases":["GHSA-gwqq-6vq7-5j86","PYSEC-2023-138"],"modified":"2026-04-10T05:00:04.457063Z","published":"2023-08-05T03:15:13.580Z","references":[{"type":"WEB","url":"http://langchain.com"},{"type":"REPORT","url":"https://github.com/langchain-ai/langchain/issues/5872"},{"type":"PACKAGE","url":"https://github.com/hwchase17/langchain"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hwchase17/langchain","events":[{"introduced":"0"},{"last_affected":"893d20f735af0387870c9a7c160ef51f34d053ad"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.0.194"}]}}],"versions":["v0.0.100","v0.0.101","v0.0.102","v0.0.103","v0.0.104","v0.0.105","v0.0.106","v0.0.107","v0.0.108","v0.0.109","v0.0.110","v0.0.111","v0.0.112","v0.0.113","v0.0.114","v0.0.115","v0.0.116","v0.0.117","v0.0.118","v0.0.119","v0.0.120","v0.0.121","v0.0.122","v0.0.123","v0.0.124","v0.0.125","v0.0.126","v0.0.127","v0.0.128","v0.0.129","v0.0.130","v0.0.131","v0.0.132","v0.0.133","v0.0.134","v0.0.135","v0.0.136","v0.0.137","v0.0.138","v0.0.139","v0.0.140","v0.0.141","v0.0.142","v0.0.143","v0.0.144","v0.0.145","v0.0.146","v0.0.147","v0.0.149","v0.0.150","v0.0.151","v0.0.152","v0.0.153","v0.0.154","v0.0.155","v0.0.156","v0.0.157","v0.0.158","v0.0.159","v0.0.160","v0.0.161","v0.0.162","v0.0.163","v0.0.164","v0.0.165","v0.0.166","v0.0.167","v0.0.168","v0.0.169","v0.0.170","v0.0.171","v0.0.172","v0.0.173","v0.0.174","v0.0.175","v0.0.177","v0.0.178","v0.0.179","v0.0.180","v0.0.181","v0.0.182","v0.0.183","v0.0.184","v0.0.185","v0.0.186","v0.0.187","v0.0.188","v0.0.189","v0.0.190","v0.0.191","v0.0.192","v0.0.193","v0.0.194","v0.0.64","v0.0.65","v0.0.66","v0.0.67","v0.0.68","v0.0.69","v0.0.70","v0.0.71","v0.0.72","v0.0.73","v0.0.74","v0.0.75","v0.0.76","v0.0.77","v0.0.78","v0.0.79","v0.0.80","v0.0.81","v0.0.82","v0.0.83","v0.0.84","v0.0.85","v0.0.86","v0.0.87","v0.0.88","v0.0.89","v0.0.90","v0.0.91","v0.0.92","v0.0.93","v0.0.94","v0.0.95","v0.0.96","v0.0.97","v0.0.98","v0.0.99"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36095.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}