Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.6

LangGraph: Untrusted Data Can Execute Malicious Code Remotely

CVE-2026-27794 GHSA-mhr3-j7m5-c7c9
Summary

If caching is enabled in LangGraph, an attacker can write malicious code to the cache, which can then be executed on your system. To prevent this, ensure that caching is not enabled or use a secure cache backend. If caching is used, make sure it's properly configured with strong security settings.

What to do
  • Update langgraph-checkpoint to version 4.0.0.
Affected software
VendorProductAffected versionsFix available
– langgraph-checkpoint <= 4.0.0 4.0.0
Original title
LangGraph: BaseCache Deserialization of Untrusted Data may lead to Remote Code Execution
Original description
## Context

A Remote Code Execution vulnerability exists in LangGraph's caching layer when applications enable cache backends that inherit from `BaseCache` and opt nodes into caching via `CachePolicy`. Prior to `langgraph-checkpoint` 4.0.0, `BaseCache` defaults to `JsonPlusSerializer(pickle_fallback=True)`. When msgpack serialization fails, cached values can be deserialized via `pickle.loads(...)`.

### Who is affected?

Caching is not enabled by default. Applications are affected only when:

- The application explicitly enables a cache backend (for example by passing `cache=...` to `StateGraph.compile(...)` or otherwise configuring a `BaseCache` implementation)
- One or more nodes opt into caching via `CachePolicy`
- The attacker can write to the cache backend (for example a network-accessible Redis instance with weak/no auth, shared cache infrastructure reachable by other tenants/services, or a writable SQLite cache file)

Example (enabling a cache backend and opting a node into caching):

```py
from langgraph.cache.memory import InMemoryCache
from langgraph.graph import StateGraph
from langgraph.types import CachePolicy


def my_node(state: dict) -> dict:
return {"value": state.get("value", 0) + 1}


builder = StateGraph(dict)
builder.add_node("my_node", my_node, cache_policy=CachePolicy(ttl=120))
builder.set_entry_point("my_node")

graph = builder.compile(cache=InMemoryCache())

result = graph.invoke({"value": 1})
```

With `pickle_fallback=True`, when msgpack serialization fails, `JsonPlusSerializer` can fall back to storing values as a `("pickle", <bytes>)` tuple and later deserialize them via `pickle.loads(...)`. If an attacker can place a malicious pickle payload into the cache backend such that the LangGraph process reads and deserializes it, this can lead to arbitrary code execution.

Exploitation requires attacker write access to the cache backend. The serializer is not exposed as a network-facing API.

This is fixed in `langgraph-checkpoint>=4.0.0` by disabling pickle fallback by default (`pickle_fallback=False`).

## Impact

Arbitrary code execution in the LangGraph process when attacker-controlled cache entries are deserialized.

## Root Cause

- `BaseCache` default serializer configuration inherited by cache implementations (`InMemoryCache`, `RedisCache`, `SqliteCache`):
- `libs/checkpoint/langgraph/cache/base/__init__.py` (pre-fix default: `JsonPlusSerializer(pickle_fallback=True)`)

- `JsonPlusSerializer` deserialization sink:
- `libs/checkpoint/langgraph/checkpoint/serde/jsonplus.py`
- `loads_typed(...)` calls `pickle.loads(data_)` when `type_ == "pickle"` and pickle fallback is enabled

## Attack preconditions

An attacker must be able to write attacker-controlled bytes into the cache backend such that the LangGraph process later reads and deserializes them.

This typically requires write access to a networked cache (for example a network-accessible Redis instance with weak/no auth or shared cache infrastructure reachable by other tenants/services) or write access to local cache storage (for example a writable SQLite cache file via permissive file permissions or a shared writable volume).

Because exploitation requires write access to the cache storage layer, this is a post-compromise / post-access escalation vector.

## Remediation

- Upgrade to `langgraph-checkpoint>=4.0.0`.

## Resources

- ZDI-CAN-28385
- Patch: https://github.com/langchain-ai/langgraph/pull/6677
- Patch diff: https://patch-diff.githubusercontent.com/raw/langchain-ai/langgraph/pull/6677.patch
- Credit: Peter Girnus (@gothburz), Demeng Chen, and Brandon Niemczyk (Trend Micro Zero Day Initiative)
nvd CVSS3.1 6.6
Vulnerability type
CWE-502 Deserialization of Untrusted Data
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026