LangChain ‘LangGrinch’ Flaw Lets Attackers Steal Secrets Now

Critical LangChain Core serialization injection (CVE-2025-68664) can expose secrets and enable prompt/Jinja2-based code execution — update to 1.2.5/0.3.81.

  • LangChain Core contains a critical serialization injection flaw (CVE-2025-68664, CVSS 9.3) that can expose secrets and enable prompt injection.
  • The bug stems from improper escaping of dictionaries with “lc” keys during serialization and deserialization in the library’s dump/load functions.
  • Patches restrict allowed deserialized objects, disable automatic secret loading, and block Jinja2 templates by default; affected versions should be updated immediately.

LangChain Core, the Python core package for LangChain, contains a critical vulnerability disclosed in December 2025 that can let attackers extract secrets and influence LLM outputs. Security researcher Yarden Porat reported the issue on December 4, 2025; it is tracked as CVE-2025-68664 with a CVSS score of 9.3 and nicknamed LangGrinch. See the LangChain Core reference and the 1.2.5 package details.

- Advertisement -

The maintainers said the flaw is a problem in the library’s serialization functions, noting that “A serialization injection vulnerability exists in LangChain’s dumps() and dumpd() functions” in their advisory. A serialization injection vulnerability is when an attacker supplies specially crafted serialized data that is interpreted as executable or structured objects during deserialization.

The code fails to escape user-controlled dictionaries that include an “lc” key, which the framework uses internally to mark serialized objects. According to Porat, that lets an attacker cause the system to instantiate unsafe objects when content with an “lc” key is serialized and later deserialized.

Potential outcomes include extraction of environment secrets when deserialization runs with the previous default secrets_from_env=True, instantiation of classes in trusted namespaces (such as langchain_core, langchain, and langchain_community), and possible arbitrary code execution via Jinja2 templates. The escaping bug also enables injection through LLM output fields like metadata, additional_kwargs, or response_metadata.

The patch adds an allowlist parameter “allowed_objects” to restrict deserialized classes, blocks Jinja2 templates by default, and sets secrets_from_env to False. Affected langchain-core versions are >= 1.0.0, < 1.2.5 (fixed in 1.2.5) and < 0.3.81 (fixed in 0.3.81).

- Advertisement -

A related serialization injection issue affects LangChain.js and carries CVE-2025-68665 (CVSS 8.6); see the advisory for affected npm package versions and fixes. Users are advised to update to patched releases as soon as possible.

“The most common attack vector is through LLM response fields like additional_kwargs or response_metadata, which can be controlled via prompt injection and then serialized/deserialized in streaming operations,” Porat said in his write-up.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Tesla shares slip as Q4 deliveries deemed largely neutral US

Tesla delivered 418,227 vehicles in Q4, slightly below the 422,850 company-polled consensus and last...

Institutions Pour In: 2026 Poised to Ignite ETH Value Rise!!

Ethereum insiders say 2026 could trigger significant ETH value growth as institutions increase on-chain...

EU Debates Digital Euro Privacy, Holding Limits: Compromises

The EU Council has endorsed the European Central Bank design for a digital euro...

Iran Military Export Center Accepts Crypto Payments for Arms

Mindex is accepting cryptocurrency for sales of advanced weapons systems.Buyers can pay with crypto,...

BRICS Accelerates De-Dollarization: Unit, CBDCs, Payments…

India assumed the BRICS presidency and is steering a 2026 push to reduce reliance...
- Advertisement -

Must Read

TOP 12 Day Trading Crypto Books For Beginners

Day trading cryptocurrencies has become an increasingly popular financial activity, offering the potential for huge returns to those who understand the market's complexities and...
Bitcoin (BTC) $ 90,474.00 2.54%
Ethereum (ETH) $ 3,125.56 4.58%
XRP (XRP) $ 1.99 6.30%
Bittensor (TAO) $ 243.96 7.84%
Polkadot (DOT) $ 2.05 5.93%
Cardano (ADA) $ 0.388063 10.24%
Chainlink (LINK) $ 13.25 6.68%
Hyperliquid (HYPE) $ 24.50 0.19%
Monero (XMR) $ 422.34 0.40%
Hedera (HBAR) $ 0.11991 7.68%
Toncoin (TON) $ 1.90 12.82%