CVE-2026-22252

LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allowing any authenticated user to execute shell commands as root inside the container through a single API request. This vulnerability is fixed in v0.8.2-rc2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:librechat:librechat:0.8.2:rc1:*:*:*:*:*:*

History

15 Jan 2026, 22:46

Type Values Removed Values Added
First Time Librechat
Librechat librechat
CPE cpe:2.3:a:librechat:librechat:0.8.2:rc1:*:*:*:*:*:*
References () https://github.com/danny-avila/LibreChat/commit/211b39f3113d4e6ecab84be0a83f4e9c9dea127f - () https://github.com/danny-avila/LibreChat/commit/211b39f3113d4e6ecab84be0a83f4e9c9dea127f - Patch
References () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-cxhj-j78r-p88f - () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-cxhj-j78r-p88f - Exploit, Vendor Advisory

12 Jan 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-12 19:16

Updated : 2026-01-15 22:46


NVD link : CVE-2026-22252

Mitre link : CVE-2026-22252

CVE.ORG link : CVE-2026-22252


JSON object : View

Products Affected

librechat

  • librechat
CWE
CWE-285

Improper Authorization