CVE-2026-27022
Query Injection in @langchain/langgraph-checkpoint-redis Enables Access Bypass
Publication date: 2026-02-20
Last updated on: 2026-02-20
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| langchain | langgraph-checkpoint-redis | 1.0.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in the @langchain/langgraph-checkpoint-redis package, specifically in how it handles filters for RediSearch queries. The RedisSaver and ShallowRedisSaver classes build RediSearch queries by directly inserting user-provided filter keys and values without properly escaping special syntax characters. Because RediSearch uses special characters to control query behavior, an attacker can manipulate these characters in the input to alter the query logic, leading to a query injection vulnerability.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to bypass intended access controls by manipulating the RediSearch queries through specially crafted inputs. This means unauthorized users might gain access to data or functionality that should be restricted, potentially leading to data exposure or other security issues.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade the @langchain/langgraph-checkpoint-redis package to version 1.0.2 or later, where the issue with query injection via unescaped filter keys and values has been fixed.