Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c67j-w6g6-q2cm | LangChain serialization injection vulnerability enables secret extraction in dumps/loads APIs |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 26 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 24 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain-ai
Langchain-ai langchain |
|
| Vendors & Products |
Langchain-ai
Langchain-ai langchain |
Tue, 23 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in versions 0.3.81 and 1.2.5. | |
| Title | LangChain serialization injection vulnerability enables secret extraction in dumps/loads APIs | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-24T14:40:58.427Z
Reserved: 2025-12-22T23:28:02.917Z
Link: CVE-2025-68664
Updated: 2025-12-24T14:40:46.764Z
Status : Awaiting Analysis
Published: 2025-12-23T23:15:44.933
Modified: 2025-12-29T15:58:56.260
Link: CVE-2025-68664
OpenCVE Enrichment
Updated: 2025-12-24T11:51:55Z
Github GHSA