Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66451: CWE-20: Improper Input Validation in danny-avila LibreChat

0
Medium
VulnerabilityCVE-2025-66451cvecve-2025-66451cwe-20cwe-915
Published: Thu Dec 11 2025 (12/11/2025, 22:33:24 UTC)
Source: CVE Database V5
Vendor/Project: danny-avila
Product: LibreChat

Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:21:42 UTC

Technical Analysis

CVE-2025-66451 is a vulnerability identified in the LibreChat application, a ChatGPT clone with extended features, affecting versions 0.8.0 and below. The issue stems from improper input validation (CWE-20) and insufficient sanitization of user-supplied JSON data in the PATCH endpoint /api/prompts/groups/:groupId, which is used to create and modify prompt groups. Specifically, the patchPromptGroup function forwards the entire req.body directly to the updatePromptGroup() function without filtering or validating sensitive fields. This lack of validation allows an attacker to craft malicious JSON payloads that modify prompt group properties beyond the intended scope defined by the front-end interface. The vulnerability could enable unauthorized changes to prompt configurations, potentially impacting the integrity of the prompts and the behavior of the chatbot. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:P). The impact on confidentiality and integrity is low to limited, with no effect on availability. The vulnerability was fixed in LibreChat version 0.8.1 by implementing proper input validation and filtering of sensitive fields in the PATCH endpoint. No known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations deploying LibreChat versions below 0.8.1, this vulnerability poses a risk of unauthorized modification of prompt groups, which could lead to manipulation of chatbot responses or workflows relying on prompt configurations. While the confidentiality impact is limited, the integrity of the chatbot's behavior could be compromised, potentially misleading users or automating unintended actions. This could affect sectors relying on accurate AI-driven communication, such as customer support, education, or internal knowledge management. Since no authentication is required, any user with access to the API endpoint could exploit this vulnerability, increasing the risk in multi-tenant or public-facing deployments. The absence of known exploits reduces immediate risk, but the medium severity score suggests organizations should prioritize remediation to prevent potential misuse. The impact on availability is negligible, so denial of service is unlikely. Overall, the threat could undermine trust in AI-driven services and lead to reputational damage or operational disruptions if prompt manipulation is leveraged maliciously.

Mitigation Recommendations

European organizations should immediately upgrade LibreChat installations to version 0.8.1 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement strict input validation and sanitization on the server side for the PATCH /api/prompts/groups/:groupId endpoint to ensure only allowed fields are modified. Employ API gateway or web application firewall (WAF) rules to detect and block anomalous JSON payloads attempting to alter sensitive fields. Restrict access to the prompt group modification API to authenticated and authorized users only, even if the vulnerability does not require authentication, to reduce attack surface. Monitor logs for unusual PATCH requests or prompt modifications indicative of exploitation attempts. Conduct regular security audits and penetration testing focused on API endpoints handling user input. Educate developers and administrators about secure coding practices, emphasizing input validation and least privilege principles. Finally, maintain an incident response plan to quickly address any detected exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-01T18:44:35.638Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b487c22246175c6a6ed55

Added to database: 12/11/2025, 10:41:00 PM

Last enriched: 12/19/2025, 5:21:42 AM

Last updated: 2/6/2026, 9:04:12 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats