LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/LibreChat/commit/01413eea3d3c1454d32ca9704fa9640407839737 | Patch |
| https://github.com/danny-avila/LibreChat/security/advisories/GHSA-vpqq-5qr4-655h | Exploit Vendor Advisory |
Configurations
History
15 Dec 2025, 17:51
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:* | |
| First Time |
Librechat
Librechat librechat |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| References | () https://github.com/danny-avila/LibreChat/commit/01413eea3d3c1454d32ca9704fa9640407839737 - Patch | |
| References | () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-vpqq-5qr4-655h - Exploit, Vendor Advisory |
11 Dec 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 23:15
Updated : 2025-12-15 17:51
NVD link : CVE-2025-66451
Mitre link : CVE-2025-66451
CVE.ORG link : CVE-2025-66451
JSON object : View
Products Affected
librechat
- librechat
