By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
Computing

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

News Room
Last updated: 2025/12/26 at 5:06 AM
News Room Published 26 December 2025
Share
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
SHARE

Dec 26, 2025Ravie LakshmananAI Security / DevSecOps

A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses through prompt injection.

LangChain Core (i.e., langchain-core) is a core Python package that’s part of the LangChain ecosystem, providing the core interfaces and model-agnostic abstractions for building applications powered by LLMs.

The vulnerability, tracked as CVE-2025-68664, carries a CVSS score of 9.3 out of 10.0. Security researcher Yarden Porat has been credited with reporting the vulnerability on December 4, 2025. It has been codenamed LangGrinch.

“A serialization injection vulnerability exists in LangChain’s dumps() and dumpd() functions,” the project maintainers said in an advisory. “The functions do not escape dictionaries with ‘lc’ keys when serializing free-form dictionaries.”

Cybersecurity

“The ‘lc’ key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data.”

According to Cyata researcher Porat, the crux of the problem has to do with the two functions failing to escape user-controlled dictionaries containing “lc” keys. The “lc” marker represents LangChain objects in the framework’s internal serialization format.

“So once an attacker is able to make a LangChain orchestration loop serialize and later deserialize content including an ‘lc’ key, they would instantiate an unsafe arbitrary object, potentially triggering many attacker-friendly paths,” Porat said.

This could have various outcomes, including secret extraction from environment variables when deserialization is performed with “secrets_from_env=True” (previously set by default), instantiating classes within pre-approved trusted namespaces, such as langchain_core, langchain, and langchain_community, and potentially even leading to arbitrary code execution via Jinja2 templates.

What’s more, the escaping bug enables the injection of LangChain object structures through user-controlled fields like metadata, additional_kwargs, or response_metadata via prompt injection.

The patch released by LangChain introduces new restrictive defaults in load() and loads() by means of an allowlist parameter “allowed_objects” that allows users to specify which classes can be serialized/deserialized. In addition, Jinja2 templates are blocked by default, and the “secrets_from_env” option is now set to “False” to disable automatic secret loading from the environment.

The following versions of langchain-core are affected by CVE-2025-68664 –

  • >= 1.0.0, < 1.2.5 (Fixed in 1.2.5)
  • < 0.3.81 (Fixed in 0.3.81)

It’s worth noting that there exists a similar serialization injection flaw in LangChain.js that also stems from not properly escaping objects with “lc” keys, thereby enabling secret extraction and prompt injection. This vulnerability has been assigned the CVE identifier CVE-2025-68665 (CVSS score: 8.6).

Cybersecurity

It impacts the following npm packages –

  • @langchain/core >= 1.0.0, < 1.1.8 (Fixed in 1.1.8)
  • @langchain/core < 0.3.80 (Fixed in 0.3.80)
  • langchain >= 1.0.0, < 1.2.3 (Fixed in 1.2.3)
  • langchain < 0.3.37 (Fixed in 0.3.37)

In light of the criticality of the vulnerability, users are advised to update to a patched version as soon as possible for optimal protection.

“The most common attack vector is through LLM response fields like additional_kwargs or response_metadata, which can be controlled via prompt injection and then serialized/deserialized in streaming operations,” Porat said. “This is exactly the kind of ‘AI meets classic security’ intersection where organizations get caught off guard. LLM output is an untrusted input.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Worth every penny: The best tech purchases I made in 2025 Worth every penny: The best tech purchases I made in 2025
Next Article The Dominik Diamond alternative game of the year awards 2025 The Dominik Diamond alternative game of the year awards 2025
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Moment Your LLM Stops Being an API—and Starts Being Infrastructure | HackerNoon
The Moment Your LLM Stops Being an API—and Starts Being Infrastructure | HackerNoon
Computing
Cruxy founder: Interrogate your strengths – UKTN
Cruxy founder: Interrogate your strengths – UKTN
News
Samsung’s Harman to acquire ZF’s advanced driver-assistance systems business for .76B –  News
Samsung’s Harman to acquire ZF’s advanced driver-assistance systems business for $1.76B – News
News
Spiro and the question of who owns Kenya’s electric boda bodas
Spiro and the question of who owns Kenya’s electric boda bodas
Computing

You Might also Like

The Moment Your LLM Stops Being an API—and Starts Being Infrastructure | HackerNoon
Computing

The Moment Your LLM Stops Being an API—and Starts Being Infrastructure | HackerNoon

6 Min Read
Spiro and the question of who owns Kenya’s electric boda bodas
Computing

Spiro and the question of who owns Kenya’s electric boda bodas

9 Min Read
Adapting to AI: Insights from a Project Manager in Game Development | HackerNoon
Computing

Adapting to AI: Insights from a Project Manager in Game Development | HackerNoon

16 Min Read
The FX and policy playbook behind Itana’s push for tech capital
Computing

The FX and policy playbook behind Itana’s push for tech capital

16 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?