Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69220: CWE-862: Missing Authorization in danny-avila LibreChat

0
High
VulnerabilityCVE-2025-69220cvecve-2025-69220cwe-862cwe-284
Published: Wed Jan 07 2026 (01/07/2026, 20:49:00 UTC)
Source: CVE Database V5
Vendor/Project: danny-avila
Product: LibreChat

Description

LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 does not enforce proper access control for file uploads to an agents file context and file search. An authenticated attacker with access to the agent ID can change the behavior of arbitrary agents by uploading new files to the file context or file search, even if they have no permissions for this agent. This issue is fixed in version 0.8.2-rc2.

AI-Powered Analysis

AILast updated: 01/07/2026, 21:17:12 UTC

Technical Analysis

CVE-2025-69220 is a vulnerability classified under CWE-862 (Missing Authorization) and CWE-284 (Improper Access Control) affecting the LibreChat product by danny-avila. LibreChat is a ChatGPT clone that supports additional features including agent-based file contexts and file search capabilities. In versions from 0.8.1-rc2 up to but excluding 0.8.2-rc2, the software fails to enforce proper authorization checks when handling file uploads and file searches related to agents. Specifically, an attacker who is authenticated and knows the agent ID can upload files to or search files within the context of arbitrary agents without having the necessary permissions for those agents. This unauthorized access allows the attacker to change the behavior of these agents by injecting or modifying files, potentially leading to malicious command execution or disruption of agent functionality. The vulnerability requires network access (remote) and low privileges (authenticated user), but no user interaction is needed. The CVSS v3.1 base score is 7.1, reflecting high severity due to the impact on integrity and limited impact on availability, with no confidentiality loss. The scope is changed because the attacker can affect resources beyond their initial privileges. The vulnerability was publicly disclosed on January 7, 2026, and is fixed in LibreChat version 0.8.2-rc2. No exploits have been observed in the wild so far.

Potential Impact

For European organizations using LibreChat versions 0.8.1-rc2 to 0.8.2-rc2, this vulnerability poses a significant risk to the integrity and availability of AI agent operations. Attackers with authenticated access can manipulate agent behavior by uploading malicious files, potentially leading to unauthorized actions, data corruption, or disruption of automated workflows relying on these agents. This could affect sectors relying on AI-driven chatbots or automation such as customer service, internal help desks, or data processing. The lack of proper authorization could also lead to lateral movement or privilege escalation within an organization's AI infrastructure. Although confidentiality is not directly impacted, the integrity compromise could result in misinformation or operational failures. The vulnerability's exploitation could disrupt business continuity and damage trust in AI systems. Since no known exploits are currently in the wild, proactive patching is critical to prevent future attacks.

Mitigation Recommendations

European organizations should immediately upgrade LibreChat installations to version 0.8.2-rc2 or later, where the authorization checks are properly enforced. Until patching is possible, restrict access to LibreChat agents and their file contexts by implementing strict network segmentation and access controls, limiting authenticated user permissions to only necessary agents. Monitor logs for unusual file upload or search activity related to agents, especially from accounts with low privileges. Employ multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. Conduct regular audits of agent configurations and file contexts to detect unauthorized changes. Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious file upload attempts targeting agent contexts. Finally, educate users about the importance of credential security to prevent unauthorized authenticated access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T18:00:37.183Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695ec9ec2efadb62cf81f4de

Added to database: 1/7/2026, 9:02:36 PM

Last enriched: 1/7/2026, 9:17:12 PM

Last updated: 1/8/2026, 11:02:52 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats