CVE-2025-66201: CWE-20: Improper Input Validation in danny-avila LibreChat
LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.
AI Analysis
Technical Summary
CVE-2025-66201 identifies a critical SSRF vulnerability in the LibreChat application, a ChatGPT clone that supports user-defined 'Actions' via OpenAPI specifications. Prior to version 0.8.1-rc2, LibreChat does not properly validate or sanitize the OpenAPI specs submitted by authenticated users with access to the 'Actions' feature. This improper input validation (CWE-20) allows attackers to craft malicious API definitions that cause the server to perform unauthorized HTTP requests to internal or protected endpoints. Notably, this includes cloud provider metadata services (e.g., AWS EC2 metadata, Azure Instance Metadata Service), which often contain sensitive credentials or tokens. By leveraging this SSRF (CWE-918), an attacker can potentially retrieve these secrets, enabling server impersonation or lateral movement within the network. The vulnerability requires the attacker to be authenticated and have access to the 'Actions' feature but does not require additional user interaction or elevated privileges. The flaw was publicly disclosed and assigned CVE-2025-66201 with a CVSS 4.0 score of 8.6, reflecting its high impact on confidentiality and integrity with low attack complexity. The vendor patched the issue in version 0.8.1-rc2 by implementing proper input validation and request filtering to prevent SSRF exploitation. No known exploits are currently reported in the wild.
Potential Impact
For European organizations deploying LibreChat, especially in cloud environments, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to internal services and cloud metadata endpoints, potentially exposing sensitive credentials and enabling attacker impersonation of the server. This could result in data breaches, unauthorized access to internal resources, and lateral movement within corporate networks. Organizations using LibreChat in multi-tenant or production environments face increased risk of compromise. The impact is heightened for entities relying on cloud infrastructure providers common in Europe, such as AWS Europe regions, Microsoft Azure Europe, or Google Cloud Europe, where metadata services are critical for instance identity and security. Additionally, organizations in sectors with strict data protection regulations (e.g., GDPR) may face compliance and reputational damage if such an incident occurs. The requirement for authenticated access limits exposure but does not eliminate risk, especially if user accounts are compromised or insufficiently restricted.
Mitigation Recommendations
1. Upgrade LibreChat to version 0.8.1-rc2 or later immediately to apply the official patch addressing this SSRF vulnerability. 2. Restrict access to the 'Actions' feature strictly to trusted and minimal users, implementing role-based access controls (RBAC) to limit potential attackers. 3. Implement network-level controls such as firewall rules or egress filtering on LibreChat servers to block unauthorized outbound requests to internal IP ranges and cloud metadata service IPs. 4. Monitor logs for unusual outbound requests originating from LibreChat, especially to internal or cloud metadata endpoints. 5. Conduct regular audits of user privileges and authentication mechanisms to prevent unauthorized access to the vulnerable feature. 6. Consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to detect and block malicious requests. 7. Educate administrators and users about the risks of SSRF and the importance of secure API specification handling. 8. If upgrading immediately is not feasible, disable or restrict the 'Actions' feature temporarily to mitigate risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Ireland, Belgium, Italy, Spain, Poland
CVE-2025-66201: CWE-20: Improper Input Validation in danny-avila LibreChat
Description
LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.
AI-Powered Analysis
Technical Analysis
CVE-2025-66201 identifies a critical SSRF vulnerability in the LibreChat application, a ChatGPT clone that supports user-defined 'Actions' via OpenAPI specifications. Prior to version 0.8.1-rc2, LibreChat does not properly validate or sanitize the OpenAPI specs submitted by authenticated users with access to the 'Actions' feature. This improper input validation (CWE-20) allows attackers to craft malicious API definitions that cause the server to perform unauthorized HTTP requests to internal or protected endpoints. Notably, this includes cloud provider metadata services (e.g., AWS EC2 metadata, Azure Instance Metadata Service), which often contain sensitive credentials or tokens. By leveraging this SSRF (CWE-918), an attacker can potentially retrieve these secrets, enabling server impersonation or lateral movement within the network. The vulnerability requires the attacker to be authenticated and have access to the 'Actions' feature but does not require additional user interaction or elevated privileges. The flaw was publicly disclosed and assigned CVE-2025-66201 with a CVSS 4.0 score of 8.6, reflecting its high impact on confidentiality and integrity with low attack complexity. The vendor patched the issue in version 0.8.1-rc2 by implementing proper input validation and request filtering to prevent SSRF exploitation. No known exploits are currently reported in the wild.
Potential Impact
For European organizations deploying LibreChat, especially in cloud environments, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to internal services and cloud metadata endpoints, potentially exposing sensitive credentials and enabling attacker impersonation of the server. This could result in data breaches, unauthorized access to internal resources, and lateral movement within corporate networks. Organizations using LibreChat in multi-tenant or production environments face increased risk of compromise. The impact is heightened for entities relying on cloud infrastructure providers common in Europe, such as AWS Europe regions, Microsoft Azure Europe, or Google Cloud Europe, where metadata services are critical for instance identity and security. Additionally, organizations in sectors with strict data protection regulations (e.g., GDPR) may face compliance and reputational damage if such an incident occurs. The requirement for authenticated access limits exposure but does not eliminate risk, especially if user accounts are compromised or insufficiently restricted.
Mitigation Recommendations
1. Upgrade LibreChat to version 0.8.1-rc2 or later immediately to apply the official patch addressing this SSRF vulnerability. 2. Restrict access to the 'Actions' feature strictly to trusted and minimal users, implementing role-based access controls (RBAC) to limit potential attackers. 3. Implement network-level controls such as firewall rules or egress filtering on LibreChat servers to block unauthorized outbound requests to internal IP ranges and cloud metadata service IPs. 4. Monitor logs for unusual outbound requests originating from LibreChat, especially to internal or cloud metadata endpoints. 5. Conduct regular audits of user privileges and authentication mechanisms to prevent unauthorized access to the vulnerable feature. 6. Consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to detect and block malicious requests. 7. Educate administrators and users about the risks of SSRF and the importance of secure API specification handling. 8. If upgrading immediately is not feasible, disable or restrict the 'Actions' feature temporarily to mitigate risk.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-24T23:01:29.676Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692a51f32a13ea799fcc56d4
Added to database: 11/29/2025, 1:52:51 AM
Last enriched: 12/6/2025, 4:33:53 AM
Last updated: 1/13/2026, 5:10:56 AM
Views: 100
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.