Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10361: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in danny-avila danny-avila/librechat

0
High
VulnerabilityCVE-2024-10361cvecve-2024-10361cwe-22
Published: Thu Mar 20 2025 (03/20/2025, 10:09:09 UTC)
Source: CVE Database V5
Vendor/Project: danny-avila
Product: danny-avila/librechat

Description

An arbitrary file deletion vulnerability exists in danny-avila/librechat version v0.7.5-rc2, specifically within the /api/files endpoint. This vulnerability arises from improper input validation, allowing path traversal techniques to delete arbitrary files on the server. Attackers can exploit this to bypass security mechanisms and delete files outside the intended directory, including critical system files, user data, or application resources. This vulnerability impacts the integrity and availability of the system.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:13:49 UTC

Technical Analysis

CVE-2024-10361 is a path traversal vulnerability classified under CWE-22 found in the open-source chat application danny-avila/librechat, version v0.7.5-rc2. The flaw exists in the /api/files endpoint, where insufficient input validation allows attackers to manipulate file path parameters to traverse directories outside the intended scope. This improper limitation enables arbitrary file deletion on the server, bypassing security controls designed to restrict file operations to a safe directory. The vulnerability impacts the integrity and availability of the system by allowing deletion of critical files, including system binaries, configuration files, user data, or application resources. The CVSS 3.0 score of 8.1 (high) reflects the network attack vector (AV:N), low attack complexity (AC:L), requirement for privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high impact on integrity (I:H) and availability (A:H). Exploitation requires an attacker to have some level of authenticated access but no user interaction, making it a serious threat in environments where user credentials can be compromised or where insider threats exist. No patches or known exploits are currently reported, but the vulnerability demands immediate attention due to its potential for severe disruption. The vulnerability highlights the importance of strict input validation and secure file operation handling in web applications, especially those managing user-generated content or files.

Potential Impact

For European organizations, the impact of CVE-2024-10361 can be significant, especially for those relying on librechat for internal or external communications. The ability to delete arbitrary files can lead to denial of service by removing critical application or system files, loss of sensitive user data, and potential disruption of business operations. This can affect confidentiality indirectly if deletion of logs or audit trails occurs, but primarily impacts integrity and availability. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are at heightened risk due to the potential operational disruption and regulatory compliance issues arising from data loss or service outages. Additionally, the requirement for low-level privileges means that attackers who gain limited access can escalate damage without needing full administrative rights. The vulnerability could also be leveraged as part of a broader attack chain to facilitate lateral movement or persistent disruption within networks. Given the increasing adoption of open-source collaboration tools in Europe, the threat surface is expanding, necessitating proactive risk management.

Mitigation Recommendations

To mitigate CVE-2024-10361, organizations should first verify if they are using the affected version of danny-avila/librechat (v0.7.5-rc2 or earlier). If so, immediate steps include: 1) Restrict access to the /api/files endpoint to trusted and authenticated users only, minimizing exposure. 2) Implement strict server-side input validation and sanitization to ensure file paths cannot include traversal sequences such as '../'. 3) Enforce a whitelist approach for allowable file operations and directories, rejecting any requests targeting paths outside the designated safe directory. 4) Employ application-level logging and monitoring to detect unusual file deletion requests or patterns indicative of exploitation attempts. 5) Use containerization or sandboxing to limit the impact of potential file deletions on the host system. 6) Regularly back up critical data and system files to enable recovery in case of successful exploitation. 7) Engage with the librechat development community for patches or updates addressing this vulnerability and apply them promptly once available. 8) Conduct security audits and penetration testing focusing on file handling endpoints to identify similar weaknesses. These targeted measures go beyond generic advice by focusing on the specific nature of the path traversal and file deletion risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-10-24T18:48:51.080Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b22178f764e1f4709ea

Added to database: 10/15/2025, 1:01:22 PM

Last enriched: 10/15/2025, 1:13:49 PM

Last updated: 10/15/2025, 2:06:16 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats