Cyber Posture

CVE-2025-68664

CriticalPublic PoCRCE

Published: 23 December 2025

Published
23 December 2025
Modified
13 January 2026
KEV Added
Patch
CVSS Score 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
EPSS Score 0.0226 84.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-68664 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Langchain Langchain Core. Its CVSS base score is 9.3 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Stealth (T1211); ranked in the top 15.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the LLM/Generative AI Risks risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Stealth (T1211) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of the serialization injection flaw in LangChain's dumps() and dumpd() functions via patching to versions 0.3.81 or 1.2.5.

prevent

Validates user-controlled inputs prior to serialization to block malicious dictionaries containing 'lc' keys that could be misinterpreted as LangChain objects during deserialization.

detect

Scans for known vulnerabilities like CVE-2025-68664 in LangChain components to identify and prioritize remediation of the deserialization injection issue.

MITRE ATT&CK Enterprise TechniquesAI

T1211 Exploitation for Stealth Stealth
Adversaries may exploit vulnerabilities to evade detection by hiding activity, suppressing logging, or operating within trusted or unmonitored components.
T1620 Reflective Code Loading Stealth
Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads.
Why these techniques?

The serialization injection vulnerability allows attackers to craft user-controlled dictionaries with 'lc' keys that are deserialized as legitimate LangChain objects, facilitating exploitation for defense evasion (T1211) via in-memory object instantiation and reflective code loading (T1620) without disk artifacts.

NVD Description

LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries.…

more

The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in versions 0.3.81 and 1.2.5.

Deeper analysisAI

CVE-2025-68664 is a serialization injection vulnerability in LangChain, an open-source framework for building agents and LLM-powered applications. The issue affects versions prior to 0.3.81 and 1.2.5, specifically in the dumps() and dumpd() functions, which fail to properly escape dictionaries containing 'lc' keys during serialization of free-form dictionaries. The 'lc' key is used internally by LangChain to denote serialized objects, leading to user-controlled data being misinterpreted as legitimate LangChain objects upon deserialization. This flaw corresponds to CWE-502 (Deserialization of Untrusted Data) and carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N).

Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By crafting input data containing dictionaries structured with 'lc' keys, attackers can inject serialized payloads that are treated as valid LangChain objects during deserialization, potentially enabling high confidentiality impacts such as unauthorized access to sensitive data, alongside limited integrity effects, due to the scope change from the deserialization process.

The vulnerability has been addressed in LangChain versions 0.3.81 and 1.2.5, as detailed in GitHub commits 5ec0fa69de31bbe3d76e4cf9cd65a6accb8466c8 and d9ec4c5cc78960abd37da79b0250f5642e6f0ce6, along with pull requests 34455 and 34458. Security practitioners should upgrade to these patched versions to mitigate the issue, with the release available at the langchain-core 0.3.81 tag.

Details

CWE(s)

Affected Products

langchain
langchain core
≤ 0.3.81 · 1.0.0 — 1.2.5

AI Security AnalysisAI

AI Category
AI Agent Protocols and Integrations
Risk Domain
LLM/Generative AI Risks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
LangChain is explicitly described as a framework for building agents and LLM-powered applications, directly matching the 'AI Agent Protocols and Integrations' category.

CVEs Like This One

CVE-2026-28277Same vendor: Langchain
CVE-2026-27795Same vendor: Langchain
CVE-2026-34070Same vendor: Langchain
CVE-2026-25750Same vendor: Langchain
CVE-2024-58340Same vendor: Langchain
CVE-2025-64512Shared CWE-502
CVE-2025-54366Shared CWE-502
CVE-2025-49869Shared CWE-502
CVE-2026-24954Shared CWE-502
CVE-2025-7916Shared CWE-502

References