Home LangChain CVE-2024-46946
Back to LangChain

CVE-2024-46946

LangChain Experimental - LLMSymbolicMathChain

LangChain CVSS 9.8 Updated April 6, 2026

Executive Risk Summary

"The LangChain Experimental LLMSymbolicMathChain component is vulnerable to arbitrary code execution through sympy.sympify, allowing attackers to execute system commands. This vulnerability affects versions 0.1.17 through 0.3.0 of LangChain Experimental."

Anticipated Attack Path

  1. 1. Exploitation of sympy.sympify function
  2. 2. Arbitrary code execution in LLMSymbolicMathChain
  3. 3. Potential lateral movement and further exploitation

Am I Vulnerable?

  • Verify LangChain Experimental version
  • Check for usage of LLMSymbolicMathChain component
  • Monitor for suspicious activity related to sympy.sympify function

Operational Audit Arsenal

Target Type Python module
Target Asset sympy.sympify
Standard Path LangChain Experimental installation directory

Manual Verification Required

This is a non-Windows asset (LangChain). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, but may require restart of LangChain Experimental services

Internal Work Notes

LangChain Experimental vulnerability in LLMSymbolicMathChain component allows arbitrary code execution, requiring immediate patching or mitigation.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.