CVE-2025-68664: LangChain serialization injection vulnerability enables secret extraction in dumps/loads APIs
(updated )
A serialization injection vulnerability exists in LangChain’s dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data.
References
- github.com/advisories/GHSA-c67j-w6g6-q2cm
- github.com/langchain-ai/langchain
- github.com/langchain-ai/langchain/commit/5ec0fa69de31bbe3d76e4cf9cd65a6accb8466c8
- github.com/langchain-ai/langchain/commit/d9ec4c5cc78960abd37da79b0250f5642e6f0ce6
- github.com/langchain-ai/langchain/pull/34455
- github.com/langchain-ai/langchain/pull/34458
- github.com/langchain-ai/langchain/releases/tag/langchain-core%3D%3D0.3.81
- github.com/langchain-ai/langchain/releases/tag/langchain-core%3D%3D1.2.5
- github.com/langchain-ai/langchain/security/advisories/GHSA-c67j-w6g6-q2cm
- nvd.nist.gov/vuln/detail/CVE-2025-68664
Code Behaviors & Features
Detect and mitigate CVE-2025-68664 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →