Vulnerabilities in LangSmith and SGLang - Security Alert
Basically, serious security issues were found in two AI platforms that could let hackers take control of accounts.
Serious security flaws have been identified in LangSmith and SGLang. These vulnerabilities risk account takeovers and remote code execution, affecting many users. Immediate updates and vigilance are crucial to mitigate these threats.
The Flaw
Recent reports have uncovered serious vulnerabilities in the AI development platform LangSmith and the large language model framework SGLang. LangSmith is affected by a high-severity account takeover vulnerability, identified as CVE-2026-25750. This flaw allows attackers to potentially steal login credentials and gain unauthorized access to user accounts. It impacts both cloud and self-hosted deployments, making it crucial for users to act quickly. The issue has been addressed in the latest version, 0.12.71.
On the other hand, SGLang is facing multiple vulnerabilities: CVE-2026-3060, CVE-2026-3059, and CVE-2026-3989. These vulnerabilities allow unauthenticated remote code execution, which poses a significant risk to any deployment that exposes its features to the network. The third vulnerability involves insecure deserialization, which could lead to further exploitation.
What's at Risk
The implications of these vulnerabilities are severe. For LangSmith users, the risk of account takeover means that sensitive data could be compromised. Attackers could not only access user accounts but also view AI logs and activities, potentially leading to further exploitation of the platform.
For SGLang, the ability to execute code remotely without authentication is alarming. This could allow attackers to manipulate the AI framework in harmful ways, affecting any applications relying on SGLang. The lack of patches for the SGLang vulnerabilities compounds the risk, leaving users vulnerable until fixes are implemented.
Patch Status
LangSmith has released a patch to address the CVE-2026-25750 vulnerability, urging users to update to version 0.12.71 immediately. However, the vulnerabilities in SGLang remain unpatched, which is concerning. The ongoing exposure of these flaws means that users should be vigilant and consider implementing additional security measures until fixes are available.
Immediate Actions
To protect yourself and your organization, follow these steps:
- Update LangSmith: Ensure you are using the latest version to mitigate the account takeover risk.
- Monitor SGLang Deployments: If you are using SGLang, keep a close eye on your deployments for any unusual activity.
- Implement Additional Security Measures: Consider restricting network access to SGLang features until vulnerabilities are patched.
- Stay Informed: Keep up with updates from both LangSmith and SGLang regarding any new patches or security advisories.
By taking these proactive steps, you can help safeguard your systems against these significant vulnerabilities.
SC Media