CVE-2026-41481 — Server-Side Request Forgery

CVE-2026-41481 — Server-Side Request Forgery

CVE-2026-41481 — LangChain is a framework for building agents and LLM-powered applications. Prior to langchain-text-splitters 1.1.2, HTMLHeaderTextSplitter.split_text_from_url() validated the initial URL using validate_safe_url() but then performed the fetch with requests.get() with redirects enabl

What This Means For You

  • If your environment is affected by CWE-918, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-41481 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1071.001 Lateral Movement

LangChain SSRF via HTMLHeaderTextSplitter URL Fetch - CVE-2026-41481

Sigma YAML — free preview
title: LangChain SSRF via HTMLHeaderTextSplitter URL Fetch - CVE-2026-41481
id: scw-2026-04-24-ai-1
status: experimental
level: high
description: |
  Detects potential exploitation of CVE-2026-41481 by identifying requests to the '/split_text_from_url' endpoint within LangChain applications. This endpoint, when vulnerable, allows an attacker to provide a URL that, after redirects, can point to internal or sensitive endpoints, leading to SSRF. This rule specifically targets the vulnerable function's likely entry point.
author: SCW Feed Engine (AI-generated)
date: 2026-04-24
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-41481/
tags:
  - attack.lateral_movement
  - attack.t1071.001
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/split_text_from_url'
      cs-method:
          - 'POST'
      sc-status:
          - '200'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-41481 vulnerability CVE-2026-41481
CWE-918 weakness CWE-918
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 25, 2026 at 00:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-42171: NSIS Privilege Escalation Vulnerability

CVE-2026-42171 — NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to...

vulnerabilityCVEhigh-severitycwe-427
/SCW Vulnerability Desk /HIGH /7.8 /⚑ 4 IOCs /⚙ 3 Sigma

Saltcorn SQL Injection (CVE-2026-41478) Exposes Sensitive Data

CVE-2026-41478 — Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcorn’s mobile-sync...

vulnerabilityCVEcriticalhigh-severitysql-injectioncwe-89
/SCW Vulnerability Desk /CRITICAL /9.9 /⚑ 1 IOC /⚙ 3 Sigma

CVE-2026-41248: Clerk Auth Bypass Exposes Critical Web Applications

CVE-2026-41248 — Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests,...

vulnerabilityCVEcriticalhigh-severitycwe-436cwe-863
/SCW Vulnerability Desk /CRITICAL /9.1 /⚑ 1 IOC /⚙ 3 Sigma