CVE-2026-22252
- EPSS 0.05%
- Veröffentlicht 12.01.2026 18:01:48
- Zuletzt bearbeitet 15.01.2026 22:46:28
LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allowing any authenticated user to execute shell commands as root inside the container through ...
CVE-2025-69222
- EPSS 0.19%
- Veröffentlicht 07.01.2026 21:17:17
- Zuletzt bearbeitet 15.01.2026 21:36:03
LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 is prone to a server-side request forgery (SSRF) vulnerability due to missing restrictions of the Actions feature in the default configuration. LibreChat enables users to config...
CVE-2025-69221
- EPSS 0.03%
- Veröffentlicht 07.01.2026 21:01:13
- Zuletzt bearbeitet 15.01.2026 21:45:38
LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 does not enforce proper access control when querying agent permissions. An authenticated attacker can read the permissions of arbitrary agents, even if they have no permissions ...
CVE-2025-69220
- EPSS 0.03%
- Veröffentlicht 07.01.2026 20:49:00
- Zuletzt bearbeitet 15.01.2026 21:44:57
LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 does not enforce proper access control for file uploads to an agents file context and file search. An authenticated attacker with access to the agent ID can change the behavior ...
CVE-2025-66452
- EPSS 0.05%
- Veröffentlicht 11.12.2025 22:52:20
- Zuletzt bearbeitet 15.12.2025 17:35:25
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (...
CVE-2025-66451
- EPSS 0.08%
- Veröffentlicht 11.12.2025 22:33:24
- Zuletzt bearbeitet 15.12.2025 17:51:16
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the reque...
CVE-2025-66450
- EPSS 0.04%
- Veröffentlicht 11.12.2025 22:05:47
- Zuletzt bearbeitet 15.12.2025 17:57:48
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then b...
CVE-2025-66201
- EPSS 0.07%
- Veröffentlicht 29.11.2025 01:26:18
- Zuletzt bearbeitet 03.12.2025 21:49:38
LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions...
CVE-2025-8849
- EPSS 0.16%
- Veröffentlicht 30.10.2025 23:42:41
- Zuletzt bearbeitet 10.11.2025 17:14:43
LibreChat version 0.7.9 is vulnerable to a Denial of Service (DoS) attack due to unbounded parameter values in the `/api/memories` endpoint. The `key` and `value` parameters accept arbitrarily large inputs without proper validation, leading to a null...
CVE-2025-8850
- EPSS 0.13%
- Veröffentlicht 30.10.2025 19:59:36
- Zuletzt bearbeitet 19.11.2025 15:27:48
In danny-avila/librechat version 0.7.9, there is an insecure API design issue in the 2-Factor Authentication (2FA) flow. The system allows users to disable 2FA without requiring a valid OTP or backup code, bypassing the intended verification process....