We found results for “”
CVE-2025-65106
Good to know:
Date: November 21, 2025
LangChain is a framework for building agents and LLM-powered applications. From versions 0.3.79 and prior and 1.0.0 to 1.0.6, a template injection vulnerability exists in LangChain's prompt template system that allows attackers to access Python object internals through template syntax. This vulnerability affects applications that accept untrusted template strings (not just template variables) in ChatPromptTemplate and related prompt template classes. This issue has been patched in versions 0.3.80 and 1.0.7.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements Used in a Template Engine
CWE-1336Top Fix
Upgrade Version
Upgrade to version langchain-core - 1.0.7;langchain-core - 0.3.80;langchain-core - 1.0.7;https://github.com/langchain-ai/langchain.git - langchain-core==1.0.7;https://github.com/langchain-ai/langchain.git - langchain-core==0.3.80
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


