VulnerabilitiesHIGH

LangChain Vulnerabilities - Exposing Files and Secrets

THThe Hacker News
CVE-2026-34070CVE-2025-68664CVE-2025-67644LangChainLangGraph
🎯

Basically, some flaws in popular AI tools could let hackers steal important files and secrets.

Quick Summary

Three critical vulnerabilities in LangChain and LangGraph could expose sensitive files and secrets. Millions of users are affected, and immediate patching is crucial to mitigate risks.

The Flaw

Cybersecurity researchers have uncovered three significant vulnerabilities affecting LangChain and LangGraph, two widely used frameworks in the AI development community. These flaws, if exploited, could lead to unauthorized access to sensitive data, including filesystem files, environment secrets, and conversation histories. LangChain, with over 52 million downloads last week alone, serves as the backbone for many applications powered by Large Language Models (LLMs). Meanwhile, LangGraph builds on this foundation, allowing for more complex workflows.

The vulnerabilities are as follows:

  • CVE-2026-34070: A path traversal vulnerability that allows attackers to access arbitrary files through a specially crafted prompt.
  • CVE-2025-68664: A deserialization flaw that can leak API keys and environment secrets.
  • CVE-2025-67644: An SQL injection vulnerability that enables manipulation of SQL queries in LangGraph.

What's at Risk

The potential impact of these vulnerabilities is substantial. Successful exploitation could allow attackers to siphon off sensitive files such as Docker configurations and access critical conversation histories tied to sensitive workflows. Each vulnerability presents a unique attack vector, making it easier for malicious actors to target enterprises that rely on these frameworks. Given the interconnected nature of software dependencies, a flaw in LangChain can ripple through countless applications and libraries that utilize its code.

Researchers have noted that the vulnerabilities highlight a concerning trend: AI frameworks are not immune to classic security issues. This is particularly alarming given the rapid pace at which threat actors exploit newly disclosed vulnerabilities.

Patch Status

Fortunately, patches have been released to address these vulnerabilities. Users are urged to update their installations immediately to mitigate risks. The patch details are as follows:

  • CVE-2026-34070: Requires updating to langchain-core version 1.2.22 or higher.
  • CVE-2025-68664: Users should upgrade to langchain-core versions 0.3.81 or 1.2.5.
  • CVE-2025-67644: The fix is available in langgraph-checkpoint-sqlite version 3.0.1.

Immediate Actions

For developers and organizations using LangChain or LangGraph, immediate action is crucial. Here are some steps to take:

  • Update your frameworks: Ensure you are using the latest patched versions.
  • Review your code: Check for any potential vulnerabilities in your implementations.
  • Monitor for unusual activity: Keep an eye on your systems for any signs of unauthorized access.

As the cybersecurity landscape evolves, it is essential to remain vigilant. The interconnected nature of AI frameworks means that a single vulnerability can have far-reaching consequences. By staying informed and proactive, developers can help safeguard their applications and the sensitive data they handle.

🔒 Pro insight: The rapid exploitation of these vulnerabilities underscores the need for continuous monitoring and swift patching in AI frameworks.

Original article from

The Hacker News

Read Full Article

Related Pings

CRITICALVulnerabilities

Langflow RCE Exploitation - CISA Issues Urgent Alert

A critical vulnerability in Langflow has been exploited within hours of disclosure. CISA has flagged this issue for urgent remediation, affecting many users. Immediate patching is essential to mitigate risks.

CSO Online·
HIGHVulnerabilities

Router Vulnerabilities - TP-Link Issues Critical Patches

TP-Link has patched four serious vulnerabilities in its Archer NX routers. Users need to update their firmware immediately to protect against potential exploits. Failure to do so could lead to unauthorized access and compromised networks.

SecurityWeek·
HIGHVulnerabilities

Vulnerabilities - CISA Warns of Langflow RCE and Trivy Flaws

CISA has identified critical vulnerabilities in Langflow and Trivy, prompting immediate action from federal agencies. Exploitation is already underway, raising significant security concerns. Organizations must prioritize patching to mitigate risks and protect sensitive data.

Help Net Security·
HIGHVulnerabilities

Vulnerabilities - CISA Adds Aquasecurity Trivy Flaw Alert

CISA has added a serious flaw in Aquasecurity's Trivy to its KEV catalog. Attackers exploited this vulnerability using compromised credentials. Organizations must take immediate action to secure their systems and mitigate risks.

Security Affairs·
CRITICALVulnerabilities

Vulnerabilities - Red Hat Warns of Malware in Linux Tool

Red Hat has issued a critical warning about malware in the xz compression tool. This vulnerability can allow unauthorized access to Linux systems. Users must act quickly to secure their environments and prevent breaches.

Cyber Security News·
HIGHVulnerabilities

Vulnerabilities - CISA Flags Critical PTC Windchill Flaw

CISA has flagged a critical vulnerability in PTC's Windchill software. German police are actively warning organizations about the risks. With no patches available yet, the potential for exploitation is high, urging immediate action.

SecurityWeek·