Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems

Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems

Posted on December 26, 2025December 26, 2025 By CWS

A important vulnerability in LangChain’s core library (CVE-2025-68664) permits attackers to exfiltrate delicate atmosphere variables and doubtlessly execute code by means of deserialization flaws.

Found by a Cyata researcher and patched simply earlier than Christmas 2025, the difficulty impacts one of the crucial widespread AI frameworks with lots of of hundreds of thousands of downloads.​

LangChain-core’s dumps() and dumpd() capabilities failed to flee user-controlled dictionaries containing the reserved ‘lc’ key, which marks inside serialized objects.

This led to deserialization of untrusted knowledge (CWE-502) when LLM outputs or immediate injections influenced fields like additional_kwargs or response_metadata, triggering serialization-deserialization cycles in widespread flows reminiscent of occasion streaming, logging, and caching. A CNA-assigned CVSS rating of 9.3 charges it Important, with 12 weak patterns recognized, together with astream_events(v1) and Runnable.astream_log().​

Cyata safety researcher uncovered the flaw throughout audits of AI belief boundaries, recognizing the lacking escape in serialization code after tracing deserialization sinks.

Reported through Huntr on December 4, 2025, LangChain acknowledged it the following day and printed the advisory on December 24. Patches rolled out in langchain-core variations 0.3.81 and 1.2.5, which wrap ‘lc’-containing dicts and disable secrets_from_env by default—beforehand enabled, permitting direct env var leaks. The group awarded a document $4,000 bounty.​

Attackers may craft prompts to instantiate allowlisted lessons like ChatBedrockConverse from langchain_aws, triggering SSRF with env vars in headers for exfiltration.

PromptTemplate allows Jinja2 rendering for attainable RCE if invoked post-deserialization. LangChain’s scale amplifies threat: pepy.tech logs ~847M whole downloads, pypistats ~98M final month.​

Improve langchain-core instantly and confirm dependencies like langchain-community. Deal with LLM outputs as untrusted, audit deserialization in streaming/logs, and disable secret decision until inputs are verified. A parallel flaw hit LangChainJS (CVE-2025-68665), underscoring dangers in agentic AI plumbing.​

Organizations should stock agent deployments for swift triage amid booming LLM app adoption.​

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Critical, Exfiltrate, Langchain, Secrets, Sensitive, Systems, Vulnerability

Post navigation

Previous Post: Google Now Allows Users to Change Their @gmail.com Email Address
Next Post: Parrot 7.0 Released with New Penetration Testing and AI Tools

Related Posts

Top 10 Best Mobile Application Penetration Testing Companies in 2025 Top 10 Best Mobile Application Penetration Testing Companies in 2025 Cyber Security News
Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts Cyber Security News
4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign 4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign Cyber Security News
Exposed ‘Kim’ Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure Exposed ‘Kim’ Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure Cyber Security News
Linux 6.16 Released – Optimized for Better Performance and Networking Linux 6.16 Released – Optimized for Better Performance and Networking Cyber Security News
Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News