Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52787: n/a

0
Critical
VulnerabilityCVE-2024-52787cvecve-2024-52787
Published: Mon Nov 25 2024 (11/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-52787 is a critical path traversal vulnerability in the upload_documents method of libre-chat v0. 0. 6. Attackers can exploit this flaw by supplying a crafted filename during file upload, enabling them to access or overwrite arbitrary files on the server. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. It impacts confidentiality and integrity severely but does not affect availability. No known exploits are currently reported in the wild. Organizations using libre-chat v0. 0. 6 should urgently apply patches or implement mitigations to prevent unauthorized file system access.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:38:42 UTC

Technical Analysis

CVE-2024-52787 is a critical security vulnerability identified in the libre-chat application version 0.0.6, specifically within its upload_documents method. The flaw arises from improper validation of filenames supplied during file uploads, allowing an attacker to perform a path traversal attack (CWE-22). By crafting a malicious filename containing directory traversal sequences (e.g., ../), an attacker can escape the intended upload directory and access or overwrite arbitrary files on the server's filesystem. This can lead to unauthorized disclosure of sensitive data (confidentiality impact) and modification of critical files (integrity impact). The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 9.1, reflecting the high severity due to network attack vector, low complexity, no privileges required, and no user interaction needed. Although no public exploits are currently known, the nature of the vulnerability makes it a prime target for attackers aiming to compromise systems running libre-chat 0.0.6. The absence of available patches at the time of publication necessitates immediate mitigation efforts by administrators. This vulnerability highlights the importance of robust input validation and secure file handling practices in web applications that accept user uploads.

Potential Impact

The impact of CVE-2024-52787 is significant for organizations deploying libre-chat v0.0.6. Successful exploitation allows attackers to read or overwrite arbitrary files on the server, potentially exposing sensitive information such as configuration files, credentials, or user data. This can lead to data breaches, unauthorized access escalation, or persistent backdoors if critical system files are modified. The integrity of the system is compromised as attackers may alter files to maintain access or disrupt normal operations. Although availability is not directly impacted, the breach of confidentiality and integrity can have severe operational and reputational consequences. Organizations in sectors handling sensitive communications, such as government, finance, healthcare, and technology, face heightened risks. The ease of exploitation without authentication or user interaction broadens the attack surface, making automated attacks feasible. Without timely mitigation, widespread exploitation could occur, especially as libre-chat gains adoption.

Mitigation Recommendations

To mitigate CVE-2024-52787, organizations should immediately implement the following measures: 1) Apply any official patches or updates from the libre-chat maintainers once available. 2) If patches are not yet released, implement strict server-side validation to sanitize and normalize filenames, disallowing directory traversal sequences such as '../' or absolute paths. 3) Enforce file upload restrictions by limiting allowed file types and sizes. 4) Configure the upload directory with the least privileges, ensuring the application process cannot write outside designated directories. 5) Employ filesystem access controls and monitoring to detect unauthorized file modifications. 6) Consider deploying web application firewalls (WAFs) with rules to detect and block path traversal attempts. 7) Conduct thorough security reviews of file handling code to prevent similar vulnerabilities. 8) Monitor logs for suspicious upload activity and anomalous file access patterns. 9) Educate development teams on secure coding practices related to file uploads. These targeted actions go beyond generic advice by focusing on immediate containment and long-term prevention of path traversal risks in libre-chat environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb9b7ef31ef0b55a67f

Added to database: 2/25/2026, 9:38:01 PM

Last enriched: 2/26/2026, 1:38:42 AM

Last updated: 2/26/2026, 7:19:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats