CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

LangChain Core Serialization Injection Vulnerability (CVE-2025-68664)

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A critical serialization injection vulnerability in LangChain Core (CVE-2025-68664) allows attackers to steal secrets and manipulate LLM responses. The flaw, dubbed LangGrinch, arises from improper escaping of dictionaries with 'lc' keys during serialization. The vulnerability affects multiple versions of LangChain Core and LangChain.js, with patches available. The issue enables secret extraction from environment variables, instantiation of classes in trusted namespaces, and potential arbitrary code execution via Jinja2 templates. The patch introduces restrictive defaults and blocks Jinja2 templates by default. The most common attack vector is through LLM response fields like additional_kwargs or response_metadata, which can be controlled via prompt injection and then serialized/deserialized in streaming operations.

Timeline

  1. 26.12.2025 11:27 1 articles · 23h ago

    Critical LangChain Core Serialization Injection Vulnerability Disclosed

    A critical serialization injection vulnerability in LangChain Core (CVE-2025-68664) allows attackers to steal secrets and manipulate LLM responses. The flaw, dubbed LangGrinch, arises from improper escaping of dictionaries with 'lc' keys during serialization. The vulnerability affects multiple versions of LangChain Core and LangChain.js, with patches available. The issue enables secret extraction from environment variables, instantiation of classes in trusted namespaces, and potential arbitrary code execution via Jinja2 templates. The patch introduces restrictive defaults and blocks Jinja2 templates by default. The most common attack vector is through LLM response fields like additional_kwargs or response_metadata, which can be controlled via prompt injection and then serialized/deserialized in streaming operations.

    Show sources

Information Snippets

Similar Happenings

High-Severity Memory-Read Flaw in MongoDB Requires Immediate Patching

MongoDB has disclosed a high-severity flaw (CVE-2025-14847) affecting multiple versions of its database software. The vulnerability, which allows unauthenticated attackers to read uninitialized heap memory, stems from improper handling of length parameter inconsistencies in the zlib compression implementation. Admins are urged to upgrade to patched versions immediately or disable zlib compression as a temporary mitigation. The flaw has not been officially classified as an RCE, but it poses significant risks. The U.S. CISA previously added another MongoDB RCE flaw (CVE-2019-10758) to its list of known exploited vulnerabilities, highlighting the ongoing risks associated with MongoDB instances.