Vulnerability Description
@langchain/langgraph-checkpoint-redis is the Redis checkpoint and store implementation for LangGraph. A query injection vulnerability exists in the @langchain/langgraph-checkpoint-redis package's filter handling. The RedisSaver and ShallowRedisSaver classes construct RediSearch queries by directly interpolating user-provided filter keys and values without proper escaping. RediSearch has special syntax characters that can modify query behavior, and when user-controlled data contains these characters, the query logic can be manipulated to bypass intended access controls. This vulnerability is fixed in 1.0.2.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/langchain-ai/langgraphjs/commit/814c76dc3938d0f6f7e17ca3bc11d
- https://github.com/langchain-ai/langgraphjs/pull/1943
- https://github.com/langchain-ai/langgraphjs/releases/tag/@langchain/langgraph-ch
- https://github.com/langchain-ai/langgraphjs/security/advisories/GHSA-5mx2-w598-3
FAQ
What is CVE-2026-27022?
CVE-2026-27022 is a vulnerability with a CVSS score of 6.5 (MEDIUM). @langchain/langgraph-checkpoint-redis is the Redis checkpoint and store implementation for LangGraph. A query injection vulnerability exists in the @langchain/langgraph-checkpoint-redis package's filt...
How severe is CVE-2026-27022?
CVE-2026-27022 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27022?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.