Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization

Posted on November 10, 2025November 10, 2025 By CWS

A vital distant code execution vulnerability has been found in LangGraph’s checkpoint serialization system.

The flaw CVE-2025-64439 impacts variations of langgraph-checkpoint earlier than 3.0. It permits attackers to execute arbitrary Python code when untrusted information is deserialized.

The vulnerability resides in LangGraph’s JsonPlusSerializer, the default serialization protocol used for checkpoint persistence.

When the serializer encounters unlawful Unicode surrogate values throughout msgpack serialization, it routinely falls again to JSON mode.

LangGraph Vulnerability

On this fallback state, the deserializer helps a constructor-style format that reconstructs customized objects throughout loading.

The flaw carries a CVSS rating of 8.5, categorised as “Excessive” severity. It falls beneath CWE-502, which covers deserialization of untrusted information vulnerabilities.

An attacker can exploit this mechanism to inject malicious payloads that execute arbitrary features when deserialized.

AttributeDetailsCVE IDCVE-2025-64439Vulnerability TypeRemote Code Execution (RCE)ComponentLangGraph JsonPlusSerializerAffected Versionslanggraph-checkpoint Patched Versionslanggraph-checkpoint >= 3.0SeverityHigh (7.5 CVSS v4)Assault VectorNetwork

The vulnerability primarily impacts functions that meet two circumstances: They permit untrusted or user-supplied information to be endured into checkpoints, they usually use the default JsonPlusSerializer (or explicitly instantiate it).

Purposes processing solely trusted information face considerably decrease sensible threat. LangGraph-API deployments working model 0.5 or later are unaffected.

Attackers can weaponize this vulnerability by way of a rigorously crafted proof-of-concept. That injects a malicious payload structured with particular JSON components: an “lc” worth of two, a “sort” set to “constructor,” and an “id” area pointing to harmful system features like “os.system.”

When the compromised checkpoint is loaded, the deserialization course of routinely executes the embedded command.

LangChain has launched langgraph-checkpoint model 3.0 to deal with this concern.

The repair implements an allow-list for constructor deserialization, limiting permissible paths to explicitly accredited module and sophistication mixtures.

Moreover, saving payloads in JSON format has been deprecated to eradicate this unsafe fallback mechanism. Customers ought to improve instantly to model 3.0 or later.

The replace maintains full compatibility with langgraph 0.3. It requires no code modifications or import adjustments, making the patching course of easy and low-risk for many deployments.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Code, Deserialization, Execution, LangGraph, Malicious, Python, Vulnerability

Post navigation

Previous Post: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
Next Post: Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution

Related Posts

Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems Cyber Security News
Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
OpenAI Banned ChatGPT Accounts Used by Chinese Hackers to Develop Malware Cyber Security News
20 Best SNMP Monitoring Tools in 2025 Cyber Security News
Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation Cyber Security News
SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Adobe Patches 29 Vulnerabilities – SecurityWeek
  • Microsoft Patches Actively Exploited Windows Kernel Zero-Day
  • Tenzai Raises $75 Million in Seed Funding to Build AI-Powered Pentesting Platform
  • Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins
  • WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Adobe Patches 29 Vulnerabilities – SecurityWeek
  • Microsoft Patches Actively Exploited Windows Kernel Zero-Day
  • Tenzai Raises $75 Million in Seed Funding to Build AI-Powered Pentesting Platform
  • Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins
  • WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News