Home

Description

LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.

PUBLISHED Reserved 2025-11-24 | Published 2025-11-29 | Updated 2025-12-01 | Assigner GitHub_M




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-20: Improper Input Validation

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 0.8.1-rc2
affected

References

github.com/...reChat/security/advisories/GHSA-7m2q-fjwr-5x8v exploit

github.com/...reChat/security/advisories/GHSA-7m2q-fjwr-5x8v

cve.org (CVE-2025-66201)

nvd.nist.gov (CVE-2025-66201)

Download JSON