Home

Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.

PUBLISHED Reserved 2025-12-01 | Published 2025-12-11 | Updated 2025-12-12 | Assigner GitHub_M




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

< 0.8.1
affected

References

github.com/...reChat/security/advisories/GHSA-84vx-vmcf-xgpp

github.com/...ommit/6fa94d3eb8f5779363226d10dccf8b01a735744c

cve.org (CVE-2025-66450)

nvd.nist.gov (CVE-2025-66450)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.