Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Popular Python Package ‘lightning’ Hacked in Supply Chain
April 30, 2026
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Home/Vulnerabilities/Critical LangSmith Account Takeover Vulnerability Puts Users at
Vulnerabilities

Critical LangSmith Account Takeover Vulnerability Puts Users at

Miggo Security researchers have identified a critical vulnerability in LangSmith, tracked as CVE-2026-25750. This flaw directly exposes users to potential token theft and complete account takeover....

Jennifer sherman
Jennifer sherman
March 18, 2026 3 Min Read
0 0

Miggo Security researchers have identified a critical vulnerability in LangSmith, tracked as CVE-2026-25750. This flaw directly exposes users to potential token theft and complete account takeover.

As a central hub for debugging and monitoring large language model data, LangSmith processes billions of events daily, making this a high-stakes security flaw for enterprise AI environments.

The vulnerability stems from an insecure API configuration feature within LangSmith Studio. The platform uses a flexible baseUrl parameter that allows developers to direct their frontend application to fetch data from different backend APIs.

Before the patch, the application implicitly trusted this input without validating the destination domain.

This lack of validation created a severe security gap. If an authenticated LangSmith user accessed a malicious site or clicked a specially crafted link containing an attacker-controlled base URL, their browser would automatically route API requests and session credentials to the hostile server.

LangSmith Account Takeover Vulnerability

Exploiting this vulnerability does not require traditional phishing tactics where a user manually enters credentials. Instead, the attack executes silently in the background using the victim’s active session.

The sequence begins when the authenticated victim visits a malicious webpage or a legitimate site compromised by hostile JavaScript. This script then forces the browser to load a crafted LangSmith Studio URL pointing to an attacker-controlled server.

The visual diagram illustrates the end-to-end flow of the Account Takeover attack (Source: Miggo)
The visual diagram illustrates the end-to-end flow of the Account Takeover attack (Source: Miggo)

Consequently, the victim’s browser inadvertently sends its active session credentials to the malicious domain instead of the default server.

The attacker intercepts the session token and has a five-minute window to hijack the account before the token automatically expires.

An account takeover in an AI observability platform presents unique risks that extend far beyond standard unauthorized access.

Attackers gaining control of a LangSmith account can view detailed AI trace histories, which often retain raw execution data used for debugging.

Successful exploitation allows threat actors to read raw data returned from internal databases, potentially exposing proprietary source code, financial records, or sensitive customer information.

Furthermore, attackers can steal the system prompts that define the proprietary behavior and intellectual property of the organization’s AI models.

They can also hijack the account to modify project settings or delete critical observability workflows entirely.

Mitigation and Updates

LangChain patched the vulnerability by implementing a strict allowed origins policy, as reported by Miggo.

The platform now requires domains to be explicitly pre-configured as trusted origins in the account settings before they can be accepted as an API base URL. Any unauthorized base URL requests are automatically blocked.

According to the official LangSmith Security Advisory published on January 7, 2026, there is no evidence of active exploitation in the wild.

Cloud customers require no action, as the vulnerability was fully resolved on the LangSmith Cloud platform by December 15, 2025.

However, self-hosted administrators must immediately upgrade their deployments to LangSmith version 0.12.71, or Helm chart langsmith-0.12.33 and later, to ensure their environments are protected.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchphishingSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Iran Cyber Campaigns Converge with Electronic & Psy Warfare

Next Post

IPVanish macOS VPN Flaw: Privilege Escalation Vulnerability Attackers

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OpenAI’s 5-Point Plan to Strengthen AI Releases Action
April 30, 2026
CVE MCP Server: Claude Becomes a Security Analyst with
April 30, 2026
Claude Commit Infects Crypto Trading Agent with PromptMink Malware
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us