Home

Description

LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite). In versions 2.1.2 and below, the JsonPlusSerializer (used as the default serialization protocol for all checkpointing) contains a Remote Code Execution (RCE) vulnerability when deserializing payloads saved in the "json" serialization mode. By default, the serializer attempts to use "msgpack" for serialization. However, prior to version 3.0 of the checkpointer library, if illegal Unicode surrogate values caused serialization to fail, it would fall back to using the "json" mode. This issue is fixed in version 3.0.0.

PUBLISHED Reserved 2025-11-03 | Published 2025-11-07 | Updated 2025-11-07 | Assigner GitHub_M




HIGH: 7.4CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

< 3.0.0
affected

References

github.com/...ggraph/security/advisories/GHSA-wwqv-p2pp-99h5

github.com/...ommit/c5744f583b11745cd406f3059903e17bbcdcc8ac

github.com/...ckpoint/langgraph/checkpoint/serde/jsonplus.py

github.com/...in-ai/langgraph/releases/tag/checkpoint==3.0.0

cve.org (CVE-2025-64439)

nvd.nist.gov (CVE-2025-64439)

Download JSON