Search
Search Results (4 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-41258 | 1 Danny-avila | 1 Libre Chat | 2026-03-19 | 8 High |
| LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechanism and RAG API which compromises the service-level authentication of the RAG API. | ||||
| CVE-2026-31944 | 2 Danny-avila, Librechat | 2 Libre Chat, Librechat | 2026-03-17 | 7.6 High |
| LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Context Protocol) OAuth callback endpoint accepts the redirect from the identity provider and stores OAuth tokens for the user who initiated the flow, without verifying that the browser hitting the redirect URL is logged in or that the logged-in user matches the initiator. An attacker can send the authorization URL to a victim; when the victim completes the flow, the victim’s OAuth tokens are stored on the attacker’s LibreChat account, enabling account takeover of the victim’s MCP-linked services (e.g. Atlassian, Outlook). This vulnerability is fixed in 0.8.3-rc1. | ||||
| CVE-2026-31949 | 2 Danny-avila, Librechat | 2 Libre Chat, Librechat | 2026-03-17 | 6.5 Medium |
| LibreChat is a ChatGPT clone with additional features. Prior to 0.8.3-rc1, a Denial of Service (DoS) vulnerability exists in the DELETE /api/convos endpoint that allows an authenticated attacker to crash the Node.js server process by sending malformed requests. The DELETE /api/convos route handler attempts to destructure req.body.arg without validating that it exists. The server crashes due to an unhandled TypeError that bypasses Express error handling middleware and triggers process.exit(1). This vulnerability is fixed in 0.8.3-rc1. | ||||
| CVE-2024-41704 | 2 Danny-avila, Librechat | 2 Libre Chat, Librechat | 2024-11-21 | 9.1 Critical |
| LibreChat through 0.7.4-rc1 does not validate the normalized pathnames of images. | ||||
Page 1 of 1.