CVE-2025-68665
Description
LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 83 Days)
Deserialization of Untrusted Data
DraftCommon Consequences
Applicable Platforms
Langchain.Js by Langchain
cpe:2.3:a:langchain:langchain.js:*:*:*:*:*:*:*:*
Langchain.Js by Langchain
cpe:2.3:a:langchain:langchain.js:*:*:*:*:*:*:*:*
Langchain\/Core by Langchain
cpe:2.3:a:langchain:langchain\/core:*:*:*:*:*:node.js:*:*
Langchain\/Core by Langchain
cpe:2.3:a:langchain:langchain\/core:*:*:*:*:*:node.js:*:*