Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66201: CWE-20: Improper Input Validation in danny-avila LibreChat

0
High
VulnerabilityCVE-2025-66201cvecve-2025-66201cwe-20cwe-918
Published: Sat Nov 29 2025 (11/29/2025, 01:26:18 UTC)
Source: CVE Database V5
Vendor/Project: danny-avila
Product: LibreChat

Description

LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.

AI-Powered Analysis

AILast updated: 11/29/2025, 02:08:05 UTC

Technical Analysis

CVE-2025-66201 is a critical vulnerability identified in the LibreChat application, a ChatGPT clone developed by danny-avila. The flaw is rooted in improper input validation (CWE-20) within the 'Actions' feature, which accepts OpenAPI specifications to extend the language model's capabilities. Prior to version 0.8.1-rc2, an authenticated user could submit specially crafted OpenAPI specs that trigger Server-Side Request Forgery (SSRF), causing the LibreChat server to make arbitrary HTTP requests to internal or protected network resources. This includes sensitive endpoints such as cloud metadata services, which often contain credentials or tokens that could be leveraged to impersonate the server or escalate privileges. The vulnerability does not require user interaction beyond authentication and can be exploited remotely with low complexity. The CVSS 4.0 score of 8.6 reflects high impact on confidentiality and integrity, with no impact on availability. Although no public exploits have been observed, the potential for lateral movement and data exfiltration is significant. The issue was addressed in LibreChat version 0.8.1-rc2 by implementing stricter input validation and request filtering to prevent SSRF attacks.

Potential Impact

For European organizations deploying LibreChat versions earlier than 0.8.1-rc2, this vulnerability poses a substantial risk. Exploitation could allow attackers with authenticated access to bypass network segmentation and access internal services, including cloud metadata endpoints that may contain sensitive credentials. This can lead to unauthorized access to cloud infrastructure, data breaches, and potential lateral movement within corporate networks. Given the increasing adoption of cloud services and AI chat platforms in Europe, the impact extends to confidentiality and integrity of critical data and systems. Organizations in regulated sectors such as finance, healthcare, and government are particularly at risk due to the sensitivity of their data and compliance requirements. The vulnerability's exploitation could also undermine trust in AI tools and disrupt operational workflows that rely on LibreChat integrations.

Mitigation Recommendations

European organizations should immediately upgrade LibreChat installations to version 0.8.1-rc2 or later to apply the official patch. Until upgrades are completed, restrict access to the 'Actions' feature to only highly trusted users and monitor usage logs for unusual OpenAPI specification submissions. Implement network-level controls to block outbound HTTP requests from the LibreChat server to internal metadata service IP ranges and other sensitive endpoints. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SSRF patterns in API requests. Conduct regular audits of user privileges to ensure only necessary users have access to features that can trigger SSRF. Additionally, review cloud environment configurations to limit metadata service exposure and enforce the principle of least privilege on cloud credentials. Finally, integrate anomaly detection systems to identify unusual request patterns originating from LibreChat servers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.676Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692a51f32a13ea799fcc56d4

Added to database: 11/29/2025, 1:52:51 AM

Last enriched: 11/29/2025, 2:08:05 AM

Last updated: 11/29/2025, 12:03:15 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats