CVE-2025-68665 PUBLISHED CVSS 8.6 HIGH

Reported by GitHub_M · Published December 23, 2025

LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3

Risk Scores

CVSS v3.1
8.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Affected Products

VendorProductVersions
langchain-ailangchainjs@langchain/core >= 1.0.0, < 1.1.8, @langchain/core < 0.3.80, langchain >= 1.0.0, < 1.2.3
langchain-ailangchainjslangchain < 0.3.37, langchain >= 1.0.0, < 1.2.3, langchain < 0.3.37
chainguardkibana-8.170
chainguardlangfuse-20
npmlangchain0, 1.0.0, 0
chainguardkibana-9.20
chainguardlibrechat0
chainguardkibana-9.10
chainguardkibana-8.190
chainguardkibana-9.00
chainguardkibana-8.180
chainguardlangfuse-fips-20
langchaincore1.0.0, 1.0.0, 0

Timeline

References

Open in Interactive Console →