Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5mx2-w598-339m | RediSearch Query Injection in @langchain/langgraph-checkpoint-redis |
Tue, 24 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langchain-ai
Langchain-ai langgraphjs |
|
| Vendors & Products |
Langchain-ai
Langchain-ai langgraphjs |
Fri, 20 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | @langchain/langgraph-checkpoint-redis is the Redis checkpoint and store implementation for LangGraph. A query injection vulnerability exists in the @langchain/langgraph-checkpoint-redis package's filter handling. The RedisSaver and ShallowRedisSaver classes construct RediSearch queries by directly interpolating user-provided filter keys and values without proper escaping. RediSearch has special syntax characters that can modify query behavior, and when user-controlled data contains these characters, the query logic can be manipulated to bypass intended access controls. This vulnerability is fixed in 1.0.2. | |
| Title | RediSearch Query Injection in @langchain/langgraph-checkpoint-redis | |
| Weaknesses | CWE-74 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-24T18:33:25.127Z
Reserved: 2026-02-17T03:08:23.490Z
Link: CVE-2026-27022
Updated: 2026-02-24T18:33:16.867Z
Status : Deferred
Published: 2026-02-20T22:16:28.480
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-27022
No data.
OpenCVE Enrichment
Updated: 2026-04-17T17:15:23Z
Github GHSA