Skip to content

fix: patch 4 Vanta security vulnerabilities (critical, medium, low)#687

Closed
Harigithub11 wants to merge 6 commits intomainfrom
vanta-critical-vulnerabilities-fix
Closed

fix: patch 4 Vanta security vulnerabilities (critical, medium, low)#687
Harigithub11 wants to merge 6 commits intomainfrom
vanta-critical-vulnerabilities-fix

Conversation

@Harigithub11
Copy link
Copy Markdown
Contributor

@Harigithub11 Harigithub11 commented Mar 13, 2026

Patched 4 vulnerabilities flagged by Vanta across critical, medium, and low severity.

Changes:

  • [CRITICAL] CVE-2025-14009 — Updated nltk 3.9.2 → 3.9.3 (zip extraction RCE)
  • [MEDIUM] CVE-2026-28277 — Updated langgraph 1.0.7 → 1.0.10 (unsafe msgpack deserialization)
  • [MEDIUM] GHSA-78cv-mqj4-43f7 — Updated tornado 6.5.4 → 6.5.5 (cookie validation bypass)
  • [LOW] CVE-2026-26013 — Updated langchain-core 1.2.8 → 1.2.18 (SSRF via image_url)

Links:

Summary by CodeRabbit

  • Chores
    • Updated project dependencies to enhance stability and compatibility.

@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai Bot commented Mar 13, 2026

Note

Reviews paused

It looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the reviews.auto_review.auto_pause_after_reviewed_commits setting.

Use the following commands to manage reviews:

  • @coderabbitai resume to resume automatic reviews.
  • @coderabbitai review to trigger a single review.

Use the checkboxes below for quick actions:

  • ▶️ Resume reviews
  • 🔍 Trigger review

Walkthrough

Updated dependency declarations: added langchain-core>=1.2.11, tornado>=6.5.5, and langgraph>=1.0.10 to pyproject.toml; bumped nltk from >=3.9.2 to >=3.9.4 in pyproject.toml and from 3.9.2 to 3.9.4 in requirements.txt. No code or public API changes.

Changes

Cohort / File(s) Summary
Pyproject dependencies
pyproject.toml
Added langchain-core>=1.2.11, tornado>=6.5.5, langgraph>=1.0.10; bumped nltk minimum from >=3.9.2 to >=3.9.4.
Requirements
requirements.txt
Pinned nltk updated from 3.9.2 to 3.9.4.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~10 minutes

Possibly related PRs

Suggested reviewers

  • yashkrishan

Poem

🐰 I hopped through toml and pip today,
Bumped a wheel of NLTK on my way.
Langchain, Langgraph, Tornado in tow,
Dependencies sprout, my code can grow. 🥕

🚥 Pre-merge checks | ✅ 2 | ❌ 1

❌ Failed checks (1 warning)

Check name Status Explanation Resolution
Title check ⚠️ Warning The title describes patching 4 Vanta security vulnerabilities, but the actual changeset shows updates to 5 vulnerabilities (nltk patched twice for CVE-2025-14009 and CVE-2026-33231), making the title partially inaccurate. Update the title to reflect the actual number of vulnerabilities patched (5) or clarify that it covers the initial 4 Vanta findings plus an additional nltk patch discovered in commit messages.
✅ Passed checks (2 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch vanta-critical-vulnerabilities-fix

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Updated langgraph from 1.0.7 to 1.0.10 to patch unsafe msgpack checkpoint deserialization

Links:
- https://app.vanta.com/c/potpie.ai/vulnerabilities/findings-by-vulnerability?source=github&severity=MEDIUM
Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@pyproject.toml`:
- Line 35: Update the requirements.txt pin for langgraph to match the
security-bumped constraint in pyproject.toml by replacing the hard pin
langgraph==1.0.7 (currently pulled in via langchain==1.2.8) with a constraint
that allows >=1.0.10 (e.g., change the explicit langgraph entry or update the
langchain dependency to a version that depends on langgraph>=1.0.10); ensure the
final requirements line(s) reference langgraph>=1.0.10 so installations from
requirements.txt receive the patched langgraph version.
- Line 40: The pyproject change to "nltk>=3.9.3" introduces a regression that
blocks extraction from symlinked directories (see GH `#3509`); before deploying,
verify any code that extracts NLTK resources from symlinked paths by running the
exact extraction flows (e.g., calls that use nltk.download, nltk.data.path
manipulations, or package resource extraction) against symlinked directories and
add an automated test that exercises those paths; if extraction fails, revert or
pin the dependency to the prior working version (change the "nltk>=3.9.3" spec
in pyproject.toml) or hold the bump until the upstream fix is released.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: cf60d1bb-8196-4896-8b49-5279c0e08a7a

📥 Commits

Reviewing files that changed from the base of the PR and between f36a38b and 2d1d53e.

⛔ Files ignored due to path filters (1)
  • uv.lock is excluded by !**/*.lock
📒 Files selected for processing (1)
  • pyproject.toml

Comment thread pyproject.toml
Comment thread pyproject.toml Outdated
Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@pyproject.toml`:
- Line 36: Add a short note to the PR description documenting the added
dependency constraint "tornado>=6.5.5" and cite CVE-2026-31958 (DoS via
excessive multipart/form-data parts in Tornado <= 6.5.4) so reviewers/auditors
can see the justification; include the CVE identifier and a one-line reason
(e.g., mitigation of DoS in multipart/form-data handling) and mention that the
constraint upgrades Tornado to 6.5.5 or later.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: ff547923-fc3f-47a6-bb55-1c0eb8685981

📥 Commits

Reviewing files that changed from the base of the PR and between 8a36c46 and 1bf6ccf.

⛔ Files ignored due to path filters (1)
  • uv.lock is excluded by !**/*.lock
📒 Files selected for processing (1)
  • pyproject.toml

Comment thread pyproject.toml
"langchain>=1.0.3",
"langchain-core>=1.2.11",
"litellm>=1.80",
"tornado>=6.5.5",
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟡 Minor

🧩 Analysis chain

🌐 Web query:

tornado 6.5.5 security vulnerability CVE fix

💡 Result:

Apache Tornado 6.5.5 fixes CVE-2026-31958 (DoS via excessive multipart/form-data parts). Versions <= 6.5.4 are affected; 6.5.5 is the patched release. The fix adds new multipart limits (default 100 parts/request), configurable via tornado.httputil.ParseMultipartConfig, and allows disabling multipart parsing if your app doesn’t need it. [1][2]

Upgrade (pip):

python -m pip install -U "tornado>=6.5.5"

Sources:
[1] GitHub Security Advisory GHSA-qjxf-f2mg-c6mc (CVE-2026-31958)
[2] OpenCVE record for CVE-2026-31958


Ensure tornado>=6.5.5 is documented in the PR description.

This dependency fixes CVE-2026-31958 (DoS via excessive multipart/form-data parts in Tornado <= 6.5.4). The constraint is justified, but add this CVE reference to the PR description for audit trail clarity.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@pyproject.toml` at line 36, Add a short note to the PR description
documenting the added dependency constraint "tornado>=6.5.5" and cite
CVE-2026-31958 (DoS via excessive multipart/form-data parts in Tornado <= 6.5.4)
so reviewers/auditors can see the justification; include the CVE identifier and
a one-line reason (e.g., mitigation of DoS in multipart/form-data handling) and
mention that the constraint upgrades Tornado to 6.5.5 or later.

@Harigithub11 Harigithub11 changed the title Vanta critical vulnerability: Fixed CVE-2025-14009 fix: patch 4 Vanta security vulnerabilities (critical, medium, low) Mar 31, 2026
Harigithub11 and others added 2 commits March 31, 2026 15:35
CVE-2026-33231 affects nltk <= 3.9.3. Upgrading to 3.9.4 resolves it.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
- CVE-2026-34070, CVE-2026-26013: langchain-core 1.2.8 → 1.2.23
- CVE-2026-28490, CVE-2026-28498, CVE-2026-28802, CVE-2026-27962: authlib 1.6.6 → 1.6.9
- CVE-2026-32597: pyjwt 2.11.0 → 2.12.1
- CVE-2026-30922: pyasn1 0.6.2 → 0.6.3
- CVE-2026-25645: requests 2.32.5 → 2.33.1
- CVE-2026-34073: cryptography 46.0.5 → 46.0.6
- CVE-2026-4539: pygments 2.19.2 → 2.20.0
@sonarqubecloud
Copy link
Copy Markdown

@Harigithub11
Copy link
Copy Markdown
Contributor Author

Closing in favour of a new clean PR without merge conflicts.

@Harigithub11 Harigithub11 deleted the vanta-critical-vulnerabilities-fix branch March 31, 2026 11:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant