CVE ReportsCache Me If You Can: LangGraph RCE via Pickle Vulnerability ID: CVE-2026-27794 CVSS...
Vulnerability ID: CVE-2026-27794
CVSS Score: 6.6
Published: 2026-02-25
LangGraph, the brain behind many stateful LLM agents, contained a critical deserialization vulnerability in its caching layer. By defaulting to Python's insecure pickle module for fallback serialization, the library opened a backdoor for attackers with write access to the cache backend (like Redis) to execute arbitrary code on the application server. It turns out that trusting serialized data from your cache is just as dangerous as trusting user input directly.
LangGraph's checkpointing system enabled pickle_fallback=True by default. Attackers who can write to the cache (Redis/Filesystem) can inject malicious pickle payloads. When the application reads the cache, the payload executes, resulting in RCE.
4.0.0)1.0.6)Disable pickle fallback by default in BaseCache
- serde: SerializerProtocol = JsonPlusSerializer(pickle_fallback=True)
+ serde: SerializerProtocol = JsonPlusSerializer(pickle_fallback=False)
Remediation Steps:
langgraph-checkpoint to version >= 4.0.0langgraph to version >= 1.0.6pickle_fallback is not manually set to TrueRead the full report for CVE-2026-27794 on our website for more details including interactive diagrams and full exploit analysis.