LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite). In version 1.0.9 and prior, LangGraph checkpointers can load msgpack-encoded checkpoints that reconstruct Python objects during deserialization. If an attacker can modify checkpoint data in the backing store (for example, after a database compromise or other privileged write access to the persistence layer), they can potentially supply a crafted payload that triggers unsafe object reconstruction when the checkpoint is loaded. No known patch is public.
References
| Link | Resource |
|---|---|
| https://github.com/langchain-ai/langgraph/security/advisories/GHSA-g48c-2wqr-h844 | Vendor Advisory Mitigation |
Configurations
History
21 Apr 2026, 15:14
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:langchain:langgraph:*:*:*:*:*:*:*:* | |
| References | () https://github.com/langchain-ai/langgraph/security/advisories/GHSA-g48c-2wqr-h844 - Vendor Advisory, Mitigation | |
| First Time |
Langchain
Langchain langgraph |
09 Mar 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
05 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 20:16
Updated : 2026-04-21 15:14
NVD link : CVE-2026-28277
Mitre link : CVE-2026-28277
CVE.ORG link : CVE-2026-28277
JSON object : View
Products Affected
langchain
- langgraph
CWE
CWE-502
Deserialization of Untrusted Data
