Home

Description

A mass assignment vulnerability exists in danny-avila/librechat, affecting all versions. This vulnerability allows attackers to manipulate sensitive fields by automatically binding user-provided data to internal object properties or database fields without proper filtering. As a result, any extra fields in the request body are included in agentData and passed to the database layer, allowing overwriting of any field in the schema, such as author, access_level, isCollaborative, and projectIds. Additionally, the Object.Prototype can be polluted due to the use of Object.assign with spread operators.

PUBLISHED Reserved 2025-07-05 | Published 2025-09-29 | Updated 2025-09-29 | Assigner @huntr_ai




MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Problem types

CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

Any version before v0.7.9
affected

References

huntr.com/bounties/32a175c4-7543-4503-a3d0-7880abd1826b

github.com/...ommit/a37bf6719cfbc2de270f7d87b6b85d87cc1768db

cve.org (CVE-2025-7104)

nvd.nist.gov (CVE-2025-7104)

Download JSON