LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allowing any authenticated user to execute shell commands as root inside the container through a single API request. This vulnerability is fixed in v0.8.2-rc2.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/LibreChat/commit/211b39f3113d4e6ecab84be0a83f4e9c9dea127f | Patch |
| https://github.com/danny-avila/LibreChat/security/advisories/GHSA-cxhj-j78r-p88f | Exploit Vendor Advisory |
Configurations
History
15 Jan 2026, 22:46
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Librechat
Librechat librechat |
|
| CPE | cpe:2.3:a:librechat:librechat:0.8.2:rc1:*:*:*:*:*:* | |
| References | () https://github.com/danny-avila/LibreChat/commit/211b39f3113d4e6ecab84be0a83f4e9c9dea127f - Patch | |
| References | () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-cxhj-j78r-p88f - Exploit, Vendor Advisory |
12 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-12 19:16
Updated : 2026-01-15 22:46
NVD link : CVE-2026-22252
Mitre link : CVE-2026-22252
CVE.ORG link : CVE-2026-22252
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-285
Improper Authorization
