Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LangSmith Vulnerability Threatens User Security

LangSmith Vulnerability Threatens User Security

Posted on March 14, 2026 By CWS

Security researchers from Miggo have uncovered a significant vulnerability in LangSmith, labeled CVE-2026-25750, which poses a risk of token theft and potential account takeover. LangSmith, a platform central to debugging and monitoring large language model data, handles billions of daily events, making this flaw particularly concerning for enterprise AI systems.

Details of the Vulnerability

The issue arises from an insecure API configuration within LangSmith Studio. This vulnerability leverages a flexible baseUrl parameter, allowing developers to direct data retrieval from various backend APIs. Prior to a recent patch, the application did not validate the destination domain, trusting the input implicitly.

This oversight resulted in a critical security gap. Authenticated LangSmith users who accessed malicious sites or clicked crafted links risked having their API requests and session credentials redirected to an attacker-controlled server.

Exploitation Mechanism

Exploiting the vulnerability does not require traditional phishing methods. Instead, it operates silently, utilizing the victim’s active session. The attack sequence begins when a user visits a compromised webpage, triggering a script that reroutes the browser to an attacker-controlled LangSmith Studio URL.

This redirection causes the browser to send its active session credentials to a malicious domain, providing attackers a brief window to hijack the account before the token expires in five minutes.

Consequences and Mitigation

Account takeovers in AI observability platforms present significant risks. Attackers could access detailed AI trace histories, potentially revealing proprietary data, source code, or sensitive financial information. They might also alter project settings or delete critical workflows.

LangChain has addressed the vulnerability by enforcing a strict allowed origins policy. Domains must be pre-approved in account settings to be accepted as API base URLs, with unauthorized requests now automatically blocked.

According to the LangSmith Security Advisory on January 7, 2026, there is no evidence of active exploitation. While cloud customers need not take action, self-hosted administrators must upgrade to LangSmith version 0.12.71 or Helm chart langsmith-0.12.33 to secure their environments.

Cyber Security News Tags:account takeover, AI security, API security, CVE-2026-25750, cyber threats, Cybersecurity, data protection, enterprise AI, LangSmith, LangSmith Studio, Miggo Security, security patch, Software Security, token theft, Vulnerability

Post navigation

Previous Post: Windows 11 Update Bug Affects Samsung Devices
Next Post: Global Effort Shuts Down 45,000 Malicious IPs in Cybercrime Sweep

Related Posts

Why Threat Prioritization Is the Key SOC Performance Driver   Why Threat Prioritization Is the Key SOC Performance Driver   Cyber Security News
What is MCP Server – How it is Powering AI-Driven Cyber Defense What is MCP Server – How it is Powering AI-Driven Cyber Defense Cyber Security News
Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT Cyber Security News
PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access Cyber Security News
CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 Cyber Security News
PoC Exploit Released for ImageMagick RCE Vulnerability PoC Exploit Released for ImageMagick RCE Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenClaw AI Vulnerabilities Pose Security Threats
  • GlassWorm Attack Exploits Open VSX Extensions to Target Developers
  • HPE AOS-CX Flaw Allows Admin Password Resets
  • Malicious npm Packages Exploit Discord and Crypto Wallets
  • GlassWorm Campaign Expands via Malicious VSX Extensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenClaw AI Vulnerabilities Pose Security Threats
  • GlassWorm Attack Exploits Open VSX Extensions to Target Developers
  • HPE AOS-CX Flaw Allows Admin Password Resets
  • Malicious npm Packages Exploit Discord and Crypto Wallets
  • GlassWorm Campaign Expands via Malicious VSX Extensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News