Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-68664— LangChain serialization injection vulnerability enables secret extraction in dumps/loads APIs

CVSS 9.3 · Critical EPSS 2.26% · P85
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-68664

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
LangChain serialization injection vulnerability enables secret extraction in dumps/loads APIs
Source: NVD (National Vulnerability Database)
Vulnerability Description
LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in versions 0.3.81 and 1.2.5.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
LangChain 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
LangChain是LangChain开源的一个用于开发由大型语言模型 (LLM) 提供支持的应用程序的框架。 LangChain 0.3.81之前版本和1.2.5之前版本存在代码问题漏洞,该漏洞源于序列化注入,可能导致反序列化时执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
langchain-ailangchain >= 1.0.0, < 1.2.5 -

II. Public POCs for CVE-2025-68664

#POC DescriptionSource LinkShenlong Link
1A testing framework to identify and demonstrate deserialization vulnerabilities in LangChain Core (<0.3.81). Educational use onlyhttps://github.com/Ak-cybe/CVE-2025-68664-LangGrinch-PoCPOC Details
2Nonehttps://github.com/comerc/CVE-2025-68664POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-68664

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-68664

No comments yet


Leave a comment