LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/LibreChat/security/advisories/GHSA-7m2q-fjwr-5x8v | Exploit Vendor Advisory |
| https://github.com/danny-avila/LibreChat/security/advisories/GHSA-7m2q-fjwr-5x8v | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Dec 2025, 21:49
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:librechat:librechat:0.8.1:-:*:*:*:*:*:* cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:* cpe:2.3:a:librechat:librechat:0.8.1:rc1:*:*:*:*:*:* |
|
| References | () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-7m2q-fjwr-5x8v - Exploit, Vendor Advisory | |
| First Time |
Librechat
Librechat librechat |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
01 Dec 2025, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-7m2q-fjwr-5x8v - |
29 Nov 2025, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-29 02:15
Updated : 2025-12-03 21:49
NVD link : CVE-2025-66201
Mitre link : CVE-2025-66201
CVE.ORG link : CVE-2025-66201
JSON object : View
Products Affected
librechat
- librechat
