HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Critical SSTI/RCE Vulnerability (CVE‑2025‑68664) in LangChain Core 1.2.4 Exposes AI‑Driven SaaS Supply Chain

LangChain Core versions < 0.3.81 and < 1.2.5 contain an SSTI flaw that allows arbitrary command execution when malicious PromptTemplate objects are deserialized. The issue impacts any third‑party service that embeds the library, raising urgent TPRM concerns around supply‑chain compromise.

LiveThreat™ Intelligence · 📅 April 29, 2026· 📰 exploit-db.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
exploit-db.com

Server‑Side Template Injection (SSTI) & Remote Code Execution in LangChain Core 1.2.4 (CVE‑2025‑68664)

What Happened – A server‑side template injection flaw in langchain_core.load allows an attacker to craft a malicious PromptTemplate that is deserialized and executed, leading to arbitrary command execution on the host running the library. The vulnerability affects all LangChain Core versions < 0.3.81 and < 1.2.5 and was publicly disclosed on 2025‑12‑29.

Why It Matters for TPRM

  • LangChain is widely embedded in AI‑driven SaaS products; a compromised dependency can give threat actors foothold in downstream services.
  • The exploit works via unsafe deserialization, a common supply‑chain attack vector that bypasses traditional perimeter defenses.
  • Successful exploitation can lead to credential leakage, data exfiltration, or full system takeover, amplifying third‑party risk.

Who Is Affected – AI/ML platforms, SaaS vendors, data‑science consulting firms, and any organization that incorporates LangChain Core < 1.2.5 into production workloads.

Recommended Actions

  • Inventory all applications that depend on LangChain Core and verify the library version.
  • Immediately upgrade to ≥ 1.2.5 (or ≥ 0.3.81) where the deserialization guard is patched.
  • Review CI/CD pipelines for unsafe load/dumps usage and enforce strict input validation.
  • Conduct a code‑review for any custom PromptTemplate constructions that may expose Jinja2 rendering.

Technical Notes – The flaw stems from unsafe deserialization (langchain_core.load) that does not sanitize the lc key, enabling an attacker‑controlled Jinja2 template to execute os.system calls. No CVE‑specific patch existed before the release of 1.2.5. Exploit code demonstrates environment variable leakage and command execution (id). Source: Exploit‑DB 52514

📰 Original Source
https://www.exploit-db.com/exploits/52514

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.