9.1
CVE-2025-68665
- EPSS 0.05%
- Veröffentlicht 23.12.2025 22:56:04
- Zuletzt bearbeitet 13.01.2026 16:17:22
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Langchain ≫ Langchain.Js Version < 0.3.37
Langchain ≫ Langchain.Js Version >= 1.0.0 < 1.2.3
Langchain ≫ Langchain/core SwPlatformnode.js Version < 0.3.80
Langchain ≫ Langchain/core SwPlatformnode.js Version >= 1.0.0 < 1.1.8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.144 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
| security-advisories@github.com | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.