Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7105: CWE-400 Uncontrolled Resource Consumption in danny-avila danny-avila/librechat

0
Medium
VulnerabilityCVE-2025-7105cvecve-2025-7105cwe-400
Published: Mon Feb 02 2026 (02/02/2026, 10:36:24 UTC)
Source: CVE Database V5
Vendor/Project: danny-avila
Product: danny-avila/librechat

Description

A vulnerability in danny-avila/librechat allows attackers to exploit the unrestricted Fork Function in `/api/convos/fork` to fork numerous contents rapidly. If the forked content includes a Mermaid graph with a large number of nodes, it can lead to a JavaScript heap out of memory error upon service restart, causing a denial of service. This issue affects the latest version of the product.

AI-Powered Analysis

AILast updated: 02/02/2026, 11:15:31 UTC

Technical Analysis

CVE-2025-7105 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the danny-avila/librechat open-source chat platform. The flaw resides in the /api/convos/fork API endpoint, which allows users to fork existing conversation content without sufficient restrictions. An attacker can abuse this functionality by rapidly creating numerous forks, especially if the content includes complex Mermaid graphs with a large number of nodes. When the service restarts, processing these large graphs causes a JavaScript heap out of memory error, crashing the service and causing a denial of service (DoS). The vulnerability does not affect confidentiality or integrity but severely impacts availability. Exploitation requires low privileges (PR:L) and user interaction (UI:R), but no authentication bypass is needed. The CVSS 3.0 base score is 5.7, indicating medium severity. No patches or known exploits are currently available, so organizations must rely on mitigation strategies. This vulnerability highlights the risks of insufficient input validation and resource management in web applications that process complex user-generated content.

Potential Impact

For European organizations using danny-avila/librechat, this vulnerability poses a risk of service disruption due to denial of service attacks. The uncontrolled resource consumption can cause chat services to crash or become unresponsive, impacting business communications and collaboration. This may lead to operational downtime, reduced productivity, and potential reputational damage if services are customer-facing. Since the vulnerability affects availability only, data confidentiality and integrity remain intact. However, repeated or large-scale exploitation could strain IT resources and increase incident response costs. Organizations relying on librechat for critical internal or external communications should consider this vulnerability a moderate operational risk, especially in sectors where continuous availability is essential, such as finance, healthcare, and government services.

Mitigation Recommendations

To mitigate CVE-2025-7105, organizations should implement strict rate limiting on the /api/convos/fork endpoint to prevent rapid mass forking of content. Input validation should be enhanced to detect and restrict overly complex Mermaid graphs or limit the number of nodes allowed in such graphs. Monitoring and alerting on abnormal API usage patterns can help detect exploitation attempts early. Additionally, configuring JavaScript runtime memory limits and optimizing garbage collection may reduce the risk of heap exhaustion. If feasible, temporarily disabling or restricting the fork functionality until a vendor patch is available can prevent exploitation. Organizations should also keep abreast of updates from the danny-avila/librechat project for official patches or security advisories. Finally, conducting regular security assessments and penetration testing focused on resource consumption vulnerabilities will help identify similar risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-07-05T18:47:52.748Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 698083b8f9fa50a62f37059a

Added to database: 2/2/2026, 11:00:08 AM

Last enriched: 2/2/2026, 11:15:31 AM

Last updated: 3/19/2026, 3:33:20 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses