Critical LangSmith Vulnerability Enables Complete Account Takeover
LangSmith processes nearly one billion events daily, making it a central hub for corporate AI data. This newly disclosed flaw exposed authenticated users to token theft and complete account takeover.
Because the platform sits at the intersection of application logic and data, a compromised account could leak highly sensitive information, including internal SQL queries, customer records, and proprietary source code.
LangSmith Studio includes a flexible API configuration feature that allows developers to specify a target backend API using a baseUrl parameter.
Before the patch, the application implicitly trusted this input and failed to validate the destination domain.
A user already logged into LangSmith could be compromised simply by visiting an attacker-controlled website or inadvertently executing hostile JavaScript.
The attacker’s site would secretly load a crafted LangSmith URL that points to a malicious base URL.
Instead of communicating with the legitimate server, the victim’s browser would be tricked into sending their active session credentials directly to the attacker’s domain.
Unlike traditional phishing, this attack does not require the victim to enter their username or password, as the exploit occurs automatically in the background.
Once the attacker intercepts the session token, they have a five-minute window to impersonate the victim and hijack the LangSmith account.
This grants the attacker severe levels of access to the organization’s core AI logic. Successful exploitation allows an attacker to perform several critical actions:
Following responsible disclosure by Miggo Security on December 1, 2025, LangChain developed a centralized fix by implementing a strict Allowed Origins policy.
The target domain must now be explicitly pre-configured as a trusted origin in the user’s account settings, neutralizing the unauthorized base URL attack entirely.
LangChain’s official security advisory, published on January 7, 2026, confirmed that no active exploitation has been observed in the wild.
To secure environments, organizations must verify their deployment status:
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Critical LangSmith Vulnerability Enables Complete Account Takeover appeared first on Cyber Security News.
Many Chichester residents carved out their whole Saturday to participate in a marathon-length town meeting,…
Nathan Fillion’s big Firefly tease has been revealed as a new animated series set between…
He might have realized he’s about to lose a lot of money. | Image: Cath…
If you've got strong creative instincts, the ability to authentically portray emotion, and are capable…
Meta has confirmed it will permanently remove end-to-end encryption (E2EE) support from Instagram direct messages,…
ROME (AP) — Pope Leo XIV demanded a ceasefire in the Middle East on Sunday…
This website uses cookies.