TL;DR
Cyata Research published a report on December 25, 2025 describing a vulnerability in LangChain Core tracked as CVE-2025-68664 and labeled 'LangGrinch.' The report and full technical details were posted on Cyata's blog; specifics about impact, affected versions, and patches are not confirmed in the source.
What happened
On December 25, 2025, Cyata Research published an analysis titled 'All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core (CVE-2025-68664)' authored by Yarden Porat on the Cyata.ai blog. The post assigns the identifier CVE-2025-68664 to the issue and uses the name 'LangGrinch' for the reported problem. Beyond the headline and CVE label, the source content available to this report does not provide concrete technical details, exploit mechanics, a list of affected LangChain Core versions, or confirmation of successful in-the-wild exploitation. The article's presence on Cyata.ai indicates the issue was publicly disclosed via that channel on the stated date; whether the disclosure followed coordinated vulnerability disclosure practices, or whether downstream projects and users were notified in advance, is not confirmed in the source.
Why it matters
- A vulnerability in a core component of a popular AI tooling framework could affect developers, integrations, and systems that depend on LangChain Core.
- The assignment of a CVE identifier signals a recognized security issue that may require fixes, mitigations, or version updates from maintainers.
- If exploitable, flaws in orchestration libraries can introduce supply-chain or data-exposure risks for applications that run untrusted inputs or chain components.
- Lack of immediate, confirmed mitigation details increases urgency for maintainers and users to seek official guidance and patches.
Key facts
- Report title: 'All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core (CVE-2025-68664)'.
- Published by Cyata Research on December 25, 2025 and authored by Yarden Porat.
- The issue is tracked as CVE-2025-68664 and labeled 'LangGrinch' in the Cyata post.
- Full technical specifics, affected versions, and exploit details are not present in the source provided.
- The piece appears on Cyata's blog at cyata.ai; the source metadata lists a 14-minute read length.
- The source does not confirm whether LangChain maintainers have issued a patch or advisory.
- There is no confirmation in the source about active exploitation in the wild or observed incidents.
What to watch next
- Official LangChain project statement or security advisory — not confirmed in the source.
- Release notes or patched versions from LangChain maintainers addressing CVE-2025-68664 — not confirmed in the source.
- Security tooling and vendor advisories updating detection signatures or mitigation guidance — not confirmed in the source.
Quick glossary
- CVE: Common Vulnerabilities and Exposures; a cataloging system that assigns identifiers to publicly known cybersecurity vulnerabilities.
- Vulnerability: A weakness in software or systems that could be exploited to cause unintended behavior, data loss, or unauthorized access.
- Exploit: A technique or tool that takes advantage of a vulnerability to achieve unauthorized actions, such as code execution or data exfiltration.
- LangChain: A software framework used to build applications that orchestrate interactions with large language models and related components.
Reader FAQ
Who published the LangGrinch report?
The report was published by Cyata Research and authored by Yarden Porat on December 25, 2025.
Which CVE identifier relates to this issue?
The issue is referenced as CVE-2025-68664 in the Cyata report.
Are affected LangChain versions listed?
Not confirmed in the source.
Has LangChain released a patch or mitigation?
Not confirmed in the source.

Dec 19, 2025 • 2 min read Cyata Research: Critical Flaw in Cursor MCP Installation As originally published at SiliconANGLE, a new report out today from artificial intelligence… Written by Duncan…
Sources
- All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
- CVE-2025-68664 Detail – NVD
- CVE-2025-68664 LangChain Serialization Injection
- CVE-2025-68664: LangChain Deserialization RCE
Related posts
- Who Watches the Waymos? YouTuber Vincent Woo Says He Tracks Waymo Vehicles
- Unofficial monitors report Steam Store very slow or offline across regions
- HPE urges immediate patch after OneView RCE flaw rated CVSS 10.0