CVE-2026-27022: RediSearch Query Injection in @langchain/langgraph-checkpoint-redis
A query injection vulnerability exists in the @langchain/langgraph-checkpoint-redis package’s filter handling. The RedisSaver and ShallowRedisSaver classes construct RediSearch queries by directly interpolating user-provided filter keys and values without proper escaping. RediSearch has special syntax characters that can modify query behavior, and when user-controlled data contains these characters, the query logic can be manipulated to bypass intended access controls.
References
- github.com/advisories/GHSA-5mx2-w598-339m
- github.com/langchain-ai/langgraphjs
- github.com/langchain-ai/langgraphjs/commit/814c76dc3938d0f6f7e17ca3bc11d6a12270b2a1
- github.com/langchain-ai/langgraphjs/pull/1943
- github.com/langchain-ai/langgraphjs/releases/tag/@langchain/langgraph-checkpoint-redis@1.0.2
- github.com/langchain-ai/langgraphjs/security/advisories/GHSA-5mx2-w598-339m
- nvd.nist.gov/vuln/detail/CVE-2026-27022
Code Behaviors & Features
Detect and mitigate CVE-2026-27022 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →