icon

We found results for “

CVE-2025-68665

Good to know:

icon
icon
icon

Date: December 23, 2025

LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3

Severity Score

Severity Score

Weakness Type (CWE)

Deserialization of Untrusted Data

CWE-502

Top Fix

icon

Upgrade Version

Upgrade to version @langchain/core - 1.1.8;@langchain/core - 0.3.80;langchain - 1.2.3;langchain - 0.3.37;https://github.com/langchain-ai/langchainjs.git - langchain@0.3.37;https://github.com/langchain-ai/langchainjs.git - langchain@1.2.3;https://github.com/langchain-ai/langchainjs.git - @langchain/core@0.3.80;https://github.com/langchain-ai/langchainjs.git - @langchain/core@1.1.8

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us