Unrated severityOSV Advisory· Published Jan 12, 2026· Updated Mar 5, 2026
LangChain <= 0.3.1 MRKLOutputParser ReDoS
CVE-2024-58340
Description
LangChain versions up to and including 0.3.1 contain a regular expression denial-of-service (ReDoS) vulnerability in the MRKLOutputParser.parse() method (libs/langchain/langchain/agents/mrkl/output_parser.py). The parser applies a backtracking-prone regular expression when extracting tool actions from model output. An attacker who can supply or influence the parsed text (for example via prompt injection in downstream applications that pass LLM output directly into MRKLOutputParser.parse()) can trigger excessive CPU consumption by providing a crafted payload, causing significant parsing delays and a denial-of-service condition.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- huntr.com/bounties/e7ece02c-d4bb-4166-8e08-6baf4f8845bbmitretechnical-descriptionexploit
- www.vulncheck.com/advisories/langchain-mrkloutputparser-redosmitrethird-party-advisory
- www.langchain.commitreproduct
News mentions
0No linked articles in our index yet.