GHSA-4h97-wpxp-3757

Suggest an improvement
Source
https://github.com/advisories/GHSA-4h97-wpxp-3757
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-4h97-wpxp-3757/GHSA-4h97-wpxp-3757.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4h97-wpxp-3757
Aliases
  • CVE-2025-8709
Published
2025-10-26T06:30:20Z
Modified
2025-10-27T20:57:42.379069Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N CVSS Calculator
Summary
LangGraph's SQLite store implementation has a SQL Injection Vulnerability
Details

A SQL injection vulnerability exists in the langchain-ai/langgraph repository, specifically in the LangGraph's SQLite store implementation. The affected version is langgraph-checkpoint-sqlite 2.0.10. The vulnerability arises from improper handling of filter operators ($eq, $ne, $gt, $lt, $gte, $lte) where direct string concatenation is used without proper parameterization. This allows attackers to inject arbitrary SQL, leading to unauthorized access to all documents, data exfiltration of sensitive fields such as passwords and API keys, and a complete bypass of application-level security filters.

Database specific
{
    "cwe_ids": [
        "CWE-89"
    ],
    "github_reviewed_at": "2025-10-27T20:23:05Z",
    "nvd_published_at": "2025-10-26T06:15:48Z",
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

PyPI / langgraph-checkpoint-sqlite

Package

Name
langgraph-checkpoint-sqlite
View open source insights on deps.dev
Purl
pkg:pypi/langgraph-checkpoint-sqlite

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.11

Affected versions

1.*
1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
2.*
2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.0.8
2.0.9
2.0.10

Database specific

last_known_affected_version_range
"<= 2.0.10"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-4h97-wpxp-3757/GHSA-4h97-wpxp-3757.json"