CVE-2025-68665 - LangChain serialization injection vulnerability enables secret extraction

CVE-2025-68665 - LangChain serialization injection vulnerability enables secret extraction

CVE ID : CVE-2025-68665 Published : Dec. 23, 2025, 11:15 p.m. | 1 hour, 43 minutes ago Description : LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3 Severity: 8.6 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
Dec. 23, 2025

Source: Telegram CVE Monitor