CVE-2025-67644
LangGraph · LangGraph Multiple Products
A high-severity vulnerability has been identified in multiple LangGraph products, specifically within the SQLite Checkpoint component.
Executive summary
A high-severity vulnerability has been identified in multiple LangGraph products, specifically within the SQLite Checkpoint component. This flaw could allow a remote attacker to manipulate the underlying database, potentially leading to unauthorized access to sensitive data, data corruption, or denial of service. Immediate patching is required to mitigate the significant risk to data confidentiality and integrity.
Vulnerability
The vulnerability is an SQL injection flaw within the LangGraph SQLite CheckpointSaver component. The component fails to properly sanitize input when saving application state checkpoints to the SQLite database. An unauthenticated remote attacker can craft malicious input that, when processed by the CheckpointSaver, is included in a raw SQL query. This allows the attacker to execute arbitrary SQL commands within the context of the application's database user, enabling them to read, modify, or delete data, or potentially achieve remote code execution depending on the database configuration.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Successful exploitation could have a significant business impact, including the compromise of sensitive application data, conversation histories, or user information stored in the state management database. An attacker could manipulate application checkpoints to alter program flow or poison data, leading to a loss of data integrity and trust in the system. Furthermore, a successful attack could result in application downtime or a complete denial of service, disrupting business operations.
Remediation
Immediate Action: Apply the security updates provided by LangGraph immediately across all affected systems. After patching, it is critical to monitor for any signs of attempted exploitation by reviewing application and database logs for suspicious activity that may have occurred prior to remediation.
Proactive Monitoring: Security teams should monitor database logs for malformed or unusual SQL queries, particularly those targeting the checkpoint tables. Monitor application logs for unexpected errors or crashes related to the checkpointing mechanism. Network monitoring should be in place to detect anomalous outbound connections from the application server, which could indicate data exfiltration.
Compensating Controls: If immediate patching is not feasible, consider implementing a Web Application Firewall (WAF) with specific rules designed to detect and block common SQL injection patterns in traffic destined for the affected application. Additionally, ensure the database user account has the minimum necessary permissions (principle of least privilege) to limit the impact of a potential compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the High severity (CVSS 7.3) of this SQL injection vulnerability, organizations must treat its remediation as a high priority. The potential for data compromise and service disruption presents a significant risk. We strongly recommend that all organizations using affected LangGraph products apply the vendor-provided security patches immediately without delay. Although there is no current evidence of active exploitation, the ease of developing an exploit for this type of flaw means that the window of opportunity for attackers is likely to be short.