Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems

Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems

Posted on December 26, 2025December 26, 2025 By CWS

A important vulnerability in LangChain’s core library (CVE-2025-68664) permits attackers to exfiltrate delicate atmosphere variables and doubtlessly execute code by means of deserialization flaws.

Found by a Cyata researcher and patched simply earlier than Christmas 2025, the difficulty impacts one of the crucial widespread AI frameworks with lots of of hundreds of thousands of downloads.​

LangChain-core’s dumps() and dumpd() capabilities failed to flee user-controlled dictionaries containing the reserved ‘lc’ key, which marks inside serialized objects.

This led to deserialization of untrusted knowledge (CWE-502) when LLM outputs or immediate injections influenced fields like additional_kwargs or response_metadata, triggering serialization-deserialization cycles in widespread flows reminiscent of occasion streaming, logging, and caching. A CNA-assigned CVSS rating of 9.3 charges it Important, with 12 weak patterns recognized, together with astream_events(v1) and Runnable.astream_log().​

Cyata safety researcher uncovered the flaw throughout audits of AI belief boundaries, recognizing the lacking escape in serialization code after tracing deserialization sinks.

Reported through Huntr on December 4, 2025, LangChain acknowledged it the following day and printed the advisory on December 24. Patches rolled out in langchain-core variations 0.3.81 and 1.2.5, which wrap ‘lc’-containing dicts and disable secrets_from_env by default—beforehand enabled, permitting direct env var leaks. The group awarded a document $4,000 bounty.​

Attackers may craft prompts to instantiate allowlisted lessons like ChatBedrockConverse from langchain_aws, triggering SSRF with env vars in headers for exfiltration.

PromptTemplate allows Jinja2 rendering for attainable RCE if invoked post-deserialization. LangChain’s scale amplifies threat: pepy.tech logs ~847M whole downloads, pypistats ~98M final month.​

Improve langchain-core instantly and confirm dependencies like langchain-community. Deal with LLM outputs as untrusted, audit deserialization in streaming/logs, and disable secret decision until inputs are verified. A parallel flaw hit LangChainJS (CVE-2025-68665), underscoring dangers in agentic AI plumbing.​

Organizations should stock agent deployments for swift triage amid booming LLM app adoption.​

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Critical, Exfiltrate, Langchain, Secrets, Sensitive, Systems, Vulnerability

Post navigation

Previous Post: Google Now Allows Users to Change Their @gmail.com Email Address
Next Post: Parrot 7.0 Released with New Penetration Testing and AI Tools

Related Posts

Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Cyber Security News
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Cyber Security News
Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest Cyber Security News
Ransomware Hits 65% of Financial Firms in 2024 Ransomware Hits 65% of Financial Firms in 2024 Cyber Security News
Hackers Launched 8.1 Million Attack Sessions to React2Shell Vulnerability Hackers Launched 8.1 Million Attack Sessions to React2Shell Vulnerability Cyber Security News
BlindEagle Hackers Attacking Government Agencies with Powershell Scripts BlindEagle Hackers Attacking Government Agencies with Powershell Scripts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark