Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67644: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in langchain-ai langgraph

0
High
VulnerabilityCVE-2025-67644cvecve-2025-67644cwe-89
Published: Wed Dec 10 2025 (12/10/2025, 23:37:36 UTC)
Source: CVE Database V5
Vendor/Project: langchain-ai
Product: langgraph

Description

LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite). Versions 3.0.0 and below are vulnerable to SQL injection through the checkpoint implementation. Checkpoint allows attackers to manipulate SQL queries through metadata filter keys, affecting applications that accept untrusted metadata filter keys (not just filter values) in checkpoint search operations. The _metadata_predicate() function constructs SQL queries by interpolating filter keys directly into f-strings without validation. This issue is fixed in version 3.0.1.

AI-Powered Analysis

AILast updated: 12/18/2025, 00:52:14 UTC

Technical Analysis

CVE-2025-67644 is an SQL injection vulnerability identified in langchain-ai's langgraph product, specifically in versions prior to 3.0.1. The vulnerability arises from the CheckpointSaver component, which uses SQLite databases for storing checkpoint data both synchronously and asynchronously via aiosqlite. The root cause is improper neutralization of special elements in SQL commands (CWE-89), where the _metadata_predicate() function constructs SQL queries by directly interpolating metadata filter keys into Python f-strings without any validation or sanitization. This design flaw allows attackers to inject malicious SQL code through the metadata filter keys parameter, not just the filter values, which is uncommon and increases the attack surface. Exploitation requires low privileges (PR:L) but no user interaction (UI:N), and the attack vector is local (AV:L), meaning the attacker needs some level of access to the system or application environment. The vulnerability impacts confidentiality severely (C:H), with limited impact on integrity (I:L) and no impact on availability (A:N). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to applications relying on langgraph for checkpointing with untrusted metadata inputs. The issue was addressed in langgraph version 3.0.1 by implementing proper input validation and sanitization to prevent SQL injection. Organizations using affected versions should upgrade promptly and review their use of metadata filters in checkpoint operations to avoid injection risks.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive data stored within langgraph's SQLite databases, potentially exposing intellectual property, user data, or operational metadata. The ability to manipulate SQL queries through untrusted metadata filter keys could allow attackers to extract confidential information or subtly alter data integrity, undermining trust in AI-driven applications that rely on langgraph for state persistence. Given the increasing adoption of AI and machine learning frameworks in sectors such as finance, healthcare, and critical infrastructure across Europe, exploitation could have regulatory and reputational consequences, including violations of GDPR due to data breaches. The local attack vector implies that attackers may need some level of access, such as compromised internal accounts or insider threats, which are realistic in complex enterprise environments. The lack of known exploits suggests the window for proactive mitigation is still open, but the high CVSS score and scope change indicate that the vulnerability should be treated as a priority. Failure to address this could lead to lateral movement within networks, data exfiltration, or manipulation of AI model states, impacting decision-making processes and operational continuity.

Mitigation Recommendations

1. Immediate upgrade to langgraph version 3.0.1 or later, where the vulnerability is fixed. 2. Implement strict input validation and sanitization on all metadata filter keys before they are processed by the checkpoint system, ensuring that only expected keys with safe characters are accepted. 3. Restrict access to the checkpointing functionality and metadata inputs to trusted users and systems only, minimizing the risk of local exploitation. 4. Employ application-layer firewalls or runtime application self-protection (RASP) tools that can detect and block suspicious SQL query patterns indicative of injection attempts. 5. Conduct code reviews and penetration testing focused on metadata handling and checkpoint operations to identify any residual injection vectors. 6. Monitor logs for unusual query patterns or errors related to checkpoint searches that could indicate attempted exploitation. 7. Educate developers and security teams about the risks of interpolating untrusted input directly into SQL queries and promote the use of parameterized queries or ORM frameworks that inherently prevent injection. 8. For organizations unable to upgrade immediately, implement compensating controls such as input filtering proxies or sandboxing of the checkpointing process to limit potential damage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-09T18:36:41.330Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693a0800e425ca5072db0c66

Added to database: 12/10/2025, 11:53:36 PM

Last enriched: 12/18/2025, 12:52:14 AM

Last updated: 2/6/2026, 4:01:04 PM

Views: 285

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats