Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66450: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in danny-avila LibreChat

0
High
VulnerabilityCVE-2025-66450cvecve-2025-66450cwe-80
Published: Thu Dec 11 2025 (12/11/2025, 22:05:47 UTC)
Source: CVE Database V5
Vendor/Project: danny-avila
Product: LibreChat

Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:41:36 UTC

Technical Analysis

CVE-2025-66450 is a stored cross-site scripting (XSS) vulnerability categorized under CWE-80, found in the LibreChat application, a ChatGPT clone with extended features. The vulnerability exists in versions 0.8.0 and earlier, where the iconURL parameter in the POST request for submitting chat questions is insufficiently sanitized. An attacker can craft a malicious payload within this parameter that gets stored in the chat history. When this chat is shared and viewed by other users, the embedded malicious script executes in their browsers. This execution can lead to privacy violations, such as leaking user data or loading external tracking resources without consent. The vulnerability does not require any authentication, making it exploitable by any user who can submit chat messages. User interaction is necessary since the victim must open the malicious chat link to trigger the payload. The CVSS 4.0 score of 8.6 reflects the high impact on confidentiality and integrity, with low attack complexity and no privileges required. The vulnerability was publicly disclosed on December 11, 2025, and fixed in LibreChat version 0.8.1. No known exploits are reported in the wild yet. The root cause is improper neutralization of script-related HTML tags, allowing injection of executable code into the chat interface. This type of XSS can facilitate session hijacking, credential theft, or privacy breaches through tracking mechanisms embedded in the malicious payload.

Potential Impact

For European organizations, this vulnerability poses significant privacy and security risks. LibreChat is used for internal and external communications, and exploitation could lead to unauthorized disclosure of sensitive information through malicious scripts. The stored XSS can be leveraged to execute arbitrary JavaScript in the context of the victim's browser, potentially stealing session tokens, redirecting users to phishing sites, or loading tracking pixels that violate GDPR privacy mandates. This can result in regulatory penalties, reputational damage, and loss of user trust. Since the vulnerability requires no authentication, any user or external attacker can exploit it, increasing the attack surface. Organizations relying on LibreChat for customer interactions or internal collaboration may face data leakage or compromise of user accounts. The privacy impact is particularly critical given the EU's stringent data protection laws. Additionally, the ability to share malicious chats can facilitate lateral movement within organizations or supply chain attacks if LibreChat is integrated with other platforms.

Mitigation Recommendations

The primary mitigation is to upgrade LibreChat to version 0.8.1 or later, where the vulnerability is patched. Organizations should enforce strict input validation and output encoding on all user-supplied data, especially parameters like iconURL that are rendered in HTML contexts. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS. Disable or restrict the ability to share chats containing user-generated content until the patch is applied. Conduct security awareness training to educate users about the risks of opening untrusted chat links. Monitor logs for unusual activity related to chat submissions and resource loading from unknown domains. Employ web application firewalls (WAFs) with rules targeting XSS payloads to provide an additional layer of defense. Regularly audit and test the chat application for injection flaws and ensure secure coding practices are followed in future releases.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-01T18:22:06.865Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b450222246175c6a639de

Added to database: 12/11/2025, 10:26:10 PM

Last enriched: 12/11/2025, 10:41:36 PM

Last updated: 12/14/2025, 11:08:38 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats