Vulnerability Description
LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite). Versions 3.0.0 and below are vulnerable to SQL injection through the checkpoint implementation. Checkpoint allows attackers to manipulate SQL queries through metadata filter keys, affecting applications that accept untrusted metadata filter keys (not just filter values) in checkpoint search operations. The _metadata_predicate() function constructs SQL queries by interpolating filter keys directly into f-strings without validation. This issue is fixed in version 3.0.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Langchain | Langgraph-Checkpoint-Sqlite | < 3.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/langchain-ai/langgraph/commit/297242913f8ad2143ee3e2f72e67db0Patch
- https://github.com/langchain-ai/langgraph/security/advisories/GHSA-9rwj-6rc7-p77ExploitVendor Advisory
FAQ
What is CVE-2025-67644?
CVE-2025-67644 is a vulnerability with a CVSS score of 7.3 (HIGH). LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite). Versions 3.0.0 and below are vulnerable to SQL injection through...
How severe is CVE-2025-67644?
CVE-2025-67644 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-67644?
Check the references section above for vendor advisories and patch information. Affected products include: Langchain Langgraph-Checkpoint-Sqlite.