{"id":"CVE-2023-39659","details":"An issue in langchain langchain-ai v.0.0.232 and before allows a remote attacker to execute arbitrary code via a crafted script to the PythonAstREPLTool._run component.","aliases":["GHSA-prgp-w7vf-ch62","PYSEC-2023-147"],"modified":"2026-04-12T08:01:15.396521Z","published":"2023-08-15T17:15:12.930Z","references":[{"type":"REPORT","url":"https://github.com/langchain-ai/langchain/issues/7700"},{"type":"FIX","url":"https://github.com/langchain-ai/langchain/pull/5640"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/langchain-ai/langchain","events":[{"introduced":"0"},{"last_affected":"3dd0704e3835765e6f95f3f148f6c1739f18f9f4"}],"database_specific":{"cpe":"cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"0.0.232"}],"source":"CPE_FIELD"}}],"versions":["v0.0.100","v0.0.101","v0.0.102","v0.0.103","v0.0.104","v0.0.105","v0.0.106","v0.0.107","v0.0.108","v0.0.109","v0.0.110","v0.0.111","v0.0.112","v0.0.113","v0.0.114","v0.0.115","v0.0.116","v0.0.117","v0.0.118","v0.0.119","v0.0.120","v0.0.121","v0.0.122","v0.0.123","v0.0.124","v0.0.125","v0.0.126","v0.0.127","v0.0.128","v0.0.129","v0.0.130","v0.0.131","v0.0.132","v0.0.133","v0.0.134","v0.0.135","v0.0.136","v0.0.137","v0.0.138","v0.0.139","v0.0.140","v0.0.141","v0.0.142","v0.0.143","v0.0.144","v0.0.145","v0.0.146","v0.0.147","v0.0.149","v0.0.150","v0.0.151","v0.0.152","v0.0.153","v0.0.154","v0.0.155","v0.0.156","v0.0.157","v0.0.158","v0.0.159","v0.0.160","v0.0.161","v0.0.162","v0.0.163","v0.0.164","v0.0.165","v0.0.166","v0.0.167","v0.0.168","v0.0.169","v0.0.170","v0.0.171","v0.0.172","v0.0.173","v0.0.174","v0.0.175","v0.0.177","v0.0.178","v0.0.179","v0.0.180","v0.0.181","v0.0.182","v0.0.183","v0.0.184","v0.0.185","v0.0.186","v0.0.187","v0.0.188","v0.0.189","v0.0.190","v0.0.191","v0.0.192","v0.0.193","v0.0.194","v0.0.195","v0.0.196","v0.0.197","v0.0.198","v0.0.199","v0.0.200","v0.0.201","v0.0.202","v0.0.204","v0.0.205","v0.0.206","v0.0.207","v0.0.208","v0.0.209","v0.0.210","v0.0.211","v0.0.212","v0.0.213","v0.0.214","v0.0.215","v0.0.216","v0.0.217","v0.0.218","v0.0.219","v0.0.220","v0.0.221","v0.0.222","v0.0.223","v0.0.224","v0.0.225","v0.0.226","v0.0.227","v0.0.228","v0.0.229","v0.0.230","v0.0.231","v0.0.232","v0.0.64","v0.0.65","v0.0.66","v0.0.67","v0.0.68","v0.0.69","v0.0.70","v0.0.71","v0.0.72","v0.0.73","v0.0.74","v0.0.75","v0.0.76","v0.0.77","v0.0.78","v0.0.79","v0.0.80","v0.0.81","v0.0.82","v0.0.83","v0.0.84","v0.0.85","v0.0.86","v0.0.87","v0.0.88","v0.0.89","v0.0.90","v0.0.91","v0.0.92","v0.0.93","v0.0.94","v0.0.95","v0.0.96","v0.0.97","v0.0.98","v0.0.99"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-39659.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}