CVE-2026-27022: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in langchain-ai langgraphjs
@langchain/langgraph-checkpoint-redis is the Redis checkpoint and store implementation for LangGraph. A query injection vulnerability exists in the @langchain/langgraph-checkpoint-redis package's filter handling. The RedisSaver and ShallowRedisSaver classes construct RediSearch queries by directly interpolating user-provided filter keys and values without proper escaping. RediSearch has special syntax characters that can modify query behavior, and when user-controlled data contains these characters, the query logic can be manipulated to bypass intended access controls. This vulnerability is fixed in 1.0.2.
AI Analysis
Technical Summary
CVE-2026-27022 is a medium severity injection vulnerability identified in the @langchain/langgraph-checkpoint-redis package, part of the LangGraphJS ecosystem used for Redis checkpoint and store implementations. The vulnerability stems from improper neutralization of special elements in output used by downstream components, specifically in the construction of RediSearch queries. The RedisSaver and ShallowRedisSaver classes build RediSearch queries by directly interpolating user-provided filter keys and values without adequate escaping or sanitization. RediSearch query syntax includes special characters that can modify query logic, such as logical operators and wildcards. When an attacker supplies filter inputs containing these special characters, they can manipulate the query to bypass intended access controls or retrieve unauthorized data. This flaw compromises confidentiality by allowing unauthorized data exposure but does not affect data integrity or system availability. Exploitation requires the ability to submit filter parameters, implying some level of privilege or access to the application interface. The vulnerability was assigned CVE-2026-27022 and is tracked under CWE-74 (Improper Neutralization of Special Elements in Output). It was published on February 20, 2026, and fixed in version 1.0.2 of the package. No known exploits have been reported in the wild to date.
Potential Impact
The primary impact of this vulnerability is unauthorized data disclosure due to query manipulation in RediSearch. Organizations using vulnerable versions of @langchain/langgraph-checkpoint-redis could face confidentiality breaches where attackers bypass access controls and retrieve sensitive information stored in Redis via LangGraph. This can lead to exposure of proprietary data, user information, or intellectual property. Since the vulnerability does not affect integrity or availability, it is less likely to cause data corruption or service disruption. However, the breach of confidentiality can have serious compliance and reputational consequences, especially for organizations handling sensitive or regulated data. The requirement for some privilege to supply filters limits the attack surface but does not eliminate risk, particularly in multi-tenant or shared environments where attackers may gain limited access. The absence of known exploits suggests limited current threat activity but does not preclude future exploitation. Organizations worldwide that rely on LangGraphJS with Redis checkpointing and have not upgraded to version 1.0.2 remain at risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the @langchain/langgraph-checkpoint-redis package to version 1.0.2 or later, where the issue is fixed by proper escaping of user inputs in RediSearch queries. Additionally, implement strict input validation and sanitization on all user-supplied filter parameters before they reach the query construction logic. Employ the principle of least privilege to restrict who can submit filter queries, minimizing the risk of malicious input. Monitor application logs for unusual query patterns or attempts to inject special RediSearch syntax characters. Consider implementing application-layer access controls and query parameter whitelisting to prevent unauthorized query manipulation. Finally, conduct security code reviews and penetration testing focused on query injection vectors in Redis and LangGraph integrations to detect similar issues proactively.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, Netherlands, Sweden
CVE-2026-27022: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in langchain-ai langgraphjs
Description
@langchain/langgraph-checkpoint-redis is the Redis checkpoint and store implementation for LangGraph. A query injection vulnerability exists in the @langchain/langgraph-checkpoint-redis package's filter handling. The RedisSaver and ShallowRedisSaver classes construct RediSearch queries by directly interpolating user-provided filter keys and values without proper escaping. RediSearch has special syntax characters that can modify query behavior, and when user-controlled data contains these characters, the query logic can be manipulated to bypass intended access controls. This vulnerability is fixed in 1.0.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27022 is a medium severity injection vulnerability identified in the @langchain/langgraph-checkpoint-redis package, part of the LangGraphJS ecosystem used for Redis checkpoint and store implementations. The vulnerability stems from improper neutralization of special elements in output used by downstream components, specifically in the construction of RediSearch queries. The RedisSaver and ShallowRedisSaver classes build RediSearch queries by directly interpolating user-provided filter keys and values without adequate escaping or sanitization. RediSearch query syntax includes special characters that can modify query logic, such as logical operators and wildcards. When an attacker supplies filter inputs containing these special characters, they can manipulate the query to bypass intended access controls or retrieve unauthorized data. This flaw compromises confidentiality by allowing unauthorized data exposure but does not affect data integrity or system availability. Exploitation requires the ability to submit filter parameters, implying some level of privilege or access to the application interface. The vulnerability was assigned CVE-2026-27022 and is tracked under CWE-74 (Improper Neutralization of Special Elements in Output). It was published on February 20, 2026, and fixed in version 1.0.2 of the package. No known exploits have been reported in the wild to date.
Potential Impact
The primary impact of this vulnerability is unauthorized data disclosure due to query manipulation in RediSearch. Organizations using vulnerable versions of @langchain/langgraph-checkpoint-redis could face confidentiality breaches where attackers bypass access controls and retrieve sensitive information stored in Redis via LangGraph. This can lead to exposure of proprietary data, user information, or intellectual property. Since the vulnerability does not affect integrity or availability, it is less likely to cause data corruption or service disruption. However, the breach of confidentiality can have serious compliance and reputational consequences, especially for organizations handling sensitive or regulated data. The requirement for some privilege to supply filters limits the attack surface but does not eliminate risk, particularly in multi-tenant or shared environments where attackers may gain limited access. The absence of known exploits suggests limited current threat activity but does not preclude future exploitation. Organizations worldwide that rely on LangGraphJS with Redis checkpointing and have not upgraded to version 1.0.2 remain at risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the @langchain/langgraph-checkpoint-redis package to version 1.0.2 or later, where the issue is fixed by proper escaping of user inputs in RediSearch queries. Additionally, implement strict input validation and sanitization on all user-supplied filter parameters before they reach the query construction logic. Employ the principle of least privilege to restrict who can submit filter queries, minimizing the risk of malicious input. Monitor application logs for unusual query patterns or attempts to inject special RediSearch syntax characters. Consider implementing application-layer access controls and query parameter whitelisting to prevent unauthorized query manipulation. Finally, conduct security code reviews and penetration testing focused on query injection vectors in Redis and LangGraph integrations to detect similar issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-17T03:08:23.490Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6998e47bbe58cf853bd9f75b
Added to database: 2/20/2026, 10:47:23 PM
Last enriched: 2/28/2026, 12:41:25 PM
Last updated: 4/5/2026, 10:17:11 AM
Views: 208
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.