Critical LangSmith Vulnerability Enables Complete Account Takeover
LangSmith processes nearly one billion events daily, making it a central hub for corporate AI data. This newly disclosed flaw exposed authenticated users to token theft and complete account takeover.
Because the platform sits at the intersection of application logic and data, a compromised account could leak highly sensitive information, including internal SQL queries, customer records, and proprietary source code.
LangSmith Studio includes a flexible API configuration feature that allows developers to specify a target backend API using a baseUrl parameter.
Before the patch, the application implicitly trusted this input and failed to validate the destination domain.
A user already logged into LangSmith could be compromised simply by visiting an attacker-controlled website or inadvertently executing hostile JavaScript.
The attacker’s site would secretly load a crafted LangSmith URL that points to a malicious base URL.
Instead of communicating with the legitimate server, the victim’s browser would be tricked into sending their active session credentials directly to the attacker’s domain.
Unlike traditional phishing, this attack does not require the victim to enter their username or password, as the exploit occurs automatically in the background.
Once the attacker intercepts the session token, they have a five-minute window to impersonate the victim and hijack the LangSmith account.
This grants the attacker severe levels of access to the organization’s core AI logic. Successful exploitation allows an attacker to perform several critical actions:
Following responsible disclosure by Miggo Security on December 1, 2025, LangChain developed a centralized fix by implementing a strict Allowed Origins policy.
The target domain must now be explicitly pre-configured as a trusted origin in the user’s account settings, neutralizing the unauthorized base URL attack entirely.
LangChain’s official security advisory, published on January 7, 2026, confirmed that no active exploitation has been observed in the wild.
To secure environments, organizations must verify their deployment status:
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Critical LangSmith Vulnerability Enables Complete Account Takeover appeared first on Cyber Security News.
Michael Cullen, a Beloit Fire Captain, combines his passion for photography and baseball by serving…
INDIANAPOLIS, Ind. (WOWO) — U.S. Rep. Marlin Stutzman said Friday he supports suspending Indiana’s gas…
With prices of electric bikes reaching an all-time low, it's time to retire that pedal-powered…
A Song of Ice and Fire publisher Bantam Books has stepped in to debunk claims…
The U.S. Capitol in Washington, D.C., on Monday, April 15, 2024. (Photo by Jennifer Shutt/States…
Legislature 3/12/24Tennessee’s legislators seem determined to push forward on school vouchers, despite good recent evidence…
This website uses cookies.