CVE-2026-27794

6.6 MEDIUM

📋 TL;DR

LangGraph Checkpoint versions before 4.0.0 contain a remote code execution vulnerability in the caching layer when applications enable cache backends and opt nodes into caching. Attackers who can write malicious data to the cache backend (like Redis with weak authentication or writable SQLite files) can execute arbitrary code when the LangGraph process deserializes that data. Only applications explicitly configuring cache backends and enabling node caching are affected.

💻 Affected Systems

Products:
  • LangGraph Checkpoint
Versions: All versions before 4.0.0
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when: 1) Application explicitly enables cache backend (e.g., cache=... in StateGraph.compile()), 2) Nodes opt into caching via CachePolicy, 3) Attacker can write to cache backend (Redis, SQLite, etc.)

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining code execution privileges equal to the LangGraph process, potentially leading to data theft, lateral movement, or complete system takeover.

🟠

Likely Case

Post-compromise privilege escalation where an attacker with initial access to cache infrastructure can execute arbitrary code on systems running vulnerable LangGraph applications.

🟢

If Mitigated

No impact if cache backends are properly secured with authentication, access controls, and network segmentation preventing unauthorized write access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires write access to cache storage layer, making this a post-compromise vector. Attack complexity depends on cache backend accessibility and permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.0

Vendor Advisory: https://github.com/langchain-ai/langgraph/security/advisories/GHSA-mhr3-j7m5-c7c9

Restart Required: Yes

Instructions:

1. Update langgraph-checkpoint to version 4.0.0 or later using pip: pip install --upgrade langgraph-checkpoint>=4.0.0 2. Restart all LangGraph applications 3. Verify the update was successful

🔧 Temporary Workarounds

Disable caching

all

Remove cache configuration from LangGraph applications to eliminate the vulnerable code path

Remove cache=... parameter from StateGraph.compile() calls
Remove CachePolicy configurations from nodes

Secure cache backends

all

Implement strict access controls on cache infrastructure to prevent unauthorized writes

Redis: requirepass configuration with strong passwords
SQLite: set file permissions to read-only for LangGraph process
Network caches: implement firewall rules and authentication

🧯 If You Can't Patch

  • Disable all caching functionality in LangGraph applications
  • Implement network segmentation and strict access controls on all cache backends

🔍 How to Verify

Check if Vulnerable:

Check if langgraph-checkpoint version is below 4.0.0 and application uses cache backends with CachePolicy

Check Version:

pip show langgraph-checkpoint | grep Version

Verify Fix Applied:

Verify langgraph-checkpoint version is 4.0.0 or higher and review code for removed cache configurations

📡 Detection & Monitoring

Log Indicators:

  • Unexpected cache deserialization errors
  • Unusual cache write patterns from unauthorized sources
  • Process execution anomalies following cache reads

Network Indicators:

  • Unauthorized connections to cache backends
  • Suspicious data writes to Redis/SQLite cache endpoints

SIEM Query:

Process execution events following cache read operations from LangGraph applications

🔗 References

📤 Share & Export