fix(deps): bump langchain-core to ^1.2.5 to address CVE-2025-68664 (AI-Triage PR)#874
Conversation
This addresses the critical serialization injection vulnerability (GHSA-c67j-w6g6-q2cm / CVE-2025-68664) in langchain-core that allows attackers to steal secrets via the dumps/loads APIs. Fixed versions: 0.3.81+ (0.x branch) or 1.2.5+ (1.x branch) Related oncall issue: airbytehq/oncall#10773 Co-Authored-By: unknown <>
Original prompt from API User |
🤖 Devin AI EngineerI'll be helping with this pull request! Here's what you should know: ✅ I will automatically:
Note: I can only respond to comments from users who have write access to this repository. ⚙️ Control Options:
|
👋 Greetings, Airbyte Team Member!Here are some helpful tips and reminders for your convenience. Testing This CDK VersionYou can test this version of the CDK using the following: # Run the CLI from this branch:
uvx 'git+https://github.com/airbytehq/airbyte-python-cdk.git@devin/1767710896-fix-langchain-core-cve-2025-68664#egg=airbyte-python-cdk[dev]' --help
# Update a connector to use the CDK from this branch ref:
cd airbyte-integrations/connectors/source-example
poe use-cdk-branch devin/1767710896-fix-langchain-core-cve-2025-68664Helpful ResourcesPR Slash CommandsAirbyte Maintainers can execute the following slash commands on your PR:
|
Resolves merge conflicts with main branch while preserving the langchain-core version bump to ^1.2.5 (resolves to 1.2.6) to address CVE-2025-68664. Co-Authored-By: unknown <>
|
/prerelease
|
There was a problem hiding this comment.
Pull request overview
This PR updates the langchain-core dependency from ^1.0.0 to ^1.2.5 to address CVE-2025-68664, a critical serialization injection vulnerability (CVSS 9.3) that could allow attackers to extract secrets and environment variables. The update affects connectors using vector-db-based extras.
Changes:
- Bumped
langchain_coreversion constraint to address security vulnerability - Regenerated poetry.lock to resolve to langchain-core 1.2.6
- Added new transitive dependency
uuid-utils0.13.0
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
Summary
Bumps
langchain-corefrom^1.0.0to^1.2.5to address a critical security vulnerability (CVE-2025-68664 / GHSA-c67j-w6g6-q2cm, CVSS 9.3).The vulnerability is a serialization injection flaw in langchain-core's
dumps/loadsAPIs that allows attackers to extract secrets and environment variables. This affects all connectors using thevector-db-basedextras (destination-milvus, destination-weaviate, destination-pinecone, destination-pgvector, destination-snowflake-cortex).Changes:
langchain_coreversion constraint from^1.0.0to^1.2.5in pyproject.tomluuid-utils0.13.0 added by langchain-core 1.2.6Review & Testing Checklist for Human
airbyte_cdk/destinations/vector_db_based/embedder.pyordocument_processor.pyRecommended Test Plan
poetry install --all-extraspoe pytest-fastNotes
Updates since last revision