CVE-2025-68665

HIGH

LangChain <0.3.80, 1.1.8 - Code Injection

Title source: llm
STIX 2.1

Description

LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3

Scores

CVSS v3 8.6
EPSS 0.0006
EPSS Percentile 19.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-502
Status published
Products (4)
langchain/core 1.0.0 - 1.1.8npm
langchain/langchain.js < 0.3.37
langchain/langchain\/core < 0.3.80
npm/langchain 1.0.0 - 1.2.3npm
Published Dec 23, 2025
Tracked Since Feb 18, 2026