Remote Code Execution Vulnerability in LangGraph SQLite Checkpoint by LangChain AI
CVE-2025-64439
Key Information:
- Vendor
Langchain-ai
- Status
- Vendor
- CVE Published:
- 7 November 2025
Badges
What is CVE-2025-64439?
CVE-2025-64439 is a remote code execution vulnerability found in the LangGraph SQLite Checkpoint component of the LangChain AI framework. This vulnerability primarily affects versions 2.1.2 and earlier and is linked to the JsonPlusSerializer, which is utilized for serializing and deserializing data during checkpointing operations. When the JsonPlusSerializer attempts to handle payloads saved in "json" format, it could be manipulated into executing arbitrary code if specific illegal Unicode surrogate values are encountered. Prior to the introduction of version 3.0.0, the serializer would default to the "json" serialization mode if it could not complete the process using the more secure "msgpack" method. As a result, this flaw can expose organizations to significant security risks, allowing malicious actors to gain control over systems or execute unwanted commands if they successfully exploit the vulnerability.
Potential impact of CVE-2025-64439
-
Remote Code Execution: Attackers can execute arbitrary code on affected systems, leading to full system compromise. This could allow them to install malware, exfiltrate sensitive data, or disrupt services.
-
Data Integrity Risks: Exploitation may result in unauthorized modifications to application data, affecting data integrity. This can lead to corruption of stored information and loss of trust in the system's reliability.
-
Operational Disruption: Successful exploitation could hinder operations by either crashing the application or causing unintended changes, leading to downtime and potentially significant financial losses for organizations relying on the LangChain AI framework.
Affected Version(s)
langgraph < 3.0.0
News Articles
LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization
A remote code execution vulnerability discovered in LangGraph’s checkpoint serialization library, flaw resides in the JsonPlusSerializer component.
LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization
A remote code execution vulnerability discovered in LangGraph’s checkpoint serialization library, flaw resides in the JsonPlusSerializer component.
LangGraph Deserialization Flaw Enables Execution of Malicious Python Code
A critical remote code execution vulnerability has been discovered in LangGraph's checkpoint serialization library, affecting versions before 3.0.
References
CVSS V4
Timeline
- 👾
Exploit known to exist
- 📰
First article discovered by gbhackers.com
Vulnerability published
Vulnerability Reserved
