In version 0.7.8 of danny-avila/librechat, improper authorization controls in the conversation sharing feature allow unauthorized access to other users' conversations if the conversation ID is known. Although UUIDv4 conversation IDs are generated server-side and are difficult to brute force, they can be obtained from less-protected sources such as server-side access logs, browser history, or screenshots. The vulnerability permits a logged-in user to gain read-only access to another user's conversations by exploiting the `/api/share/conversationID` endpoint, which lacks authorization checks. This issue is resolved in version v0.7.9-rc1.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/librechat/commit/3af2666890bbf291cb7b9f3e03592d54714f0ff5 | Patch |
| https://huntr.com/bounties/361405bb-a739-41eb-a680-4cb6193e7c76 | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Oct 2025, 16:00
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Librechat
Librechat librechat |
|
| CPE | cpe:2.3:a:librechat:librechat:0.7.8:-:*:*:*:*:*:* cpe:2.3:a:librechat:librechat:0.7.8:rc1:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.1 |
| References | () https://github.com/danny-avila/librechat/commit/3af2666890bbf291cb7b9f3e03592d54714f0ff5 - Patch | |
| References | () https://huntr.com/bounties/361405bb-a739-41eb-a680-4cb6193e7c76 - Exploit, Patch, Third Party Advisory |
11 Sep 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-11 01:15
Updated : 2025-10-16 16:00
NVD link : CVE-2025-6088
Mitre link : CVE-2025-6088
CVE.ORG link : CVE-2025-6088
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-285
Improper Authorization
