CVE-2025-8849: CWE-400 Uncontrolled Resource Consumption in danny-avila danny-avila/librechat
LibreChat version 0.7.9 is vulnerable to a Denial of Service (DoS) attack due to unbounded parameter values in the `/api/memories` endpoint. The `key` and `value` parameters accept arbitrarily large inputs without proper validation, leading to a null pointer error in the Rust-based backend when excessively large values are submitted. This results in the inability to create new memories, impacting the stability of the service.
AI Analysis
Technical Summary
CVE-2025-8849 identifies a vulnerability in the LibreChat open-source chat platform, specifically version 0.7.9, maintained by danny-avila. The issue lies in the /api/memories REST endpoint, which accepts 'key' and 'value' parameters without enforcing size constraints or input validation. Attackers can submit excessively large inputs to these parameters, causing the Rust-based backend to encounter a null pointer error. This error disrupts the memory creation functionality, effectively resulting in a Denial of Service (DoS) condition by preventing the system from processing legitimate memory creation requests. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that resource exhaustion or improper handling of resource limits leads to service instability. The CVSS v3.0 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity and availability but not confidentiality. No patches or mitigations have been officially published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability could be exploited remotely by authenticated users or services interacting with the API, potentially leading to service disruption and degraded user experience.
Potential Impact
For European organizations deploying LibreChat, this vulnerability poses a risk to service availability, particularly for applications relying on the memory feature to enhance chat interactions. A successful exploitation could disrupt operations, degrade user trust, and cause downtime, especially in environments where chatbots or AI assistants are integral to customer service or internal workflows. While confidentiality and data integrity are not directly impacted, the denial of service could indirectly affect business continuity and operational efficiency. Organizations with high dependency on LibreChat for real-time communication or AI-driven services may experience significant disruption. Additionally, if exploited in a targeted manner, it could be used as part of a broader attack to distract or degrade defenses. The lack of known exploits reduces immediate risk, but the medium severity score and ease of triggering the fault warrant proactive mitigation.
Mitigation Recommendations
European organizations should implement strict input validation and size limits on the 'key' and 'value' parameters at the API gateway or application firewall level to prevent excessively large payloads from reaching the backend. Rate limiting and anomaly detection should be employed to identify and block abnormal request patterns targeting the /api/memories endpoint. Where possible, update LibreChat to a patched version once available or apply custom patches to enforce input constraints within the Rust backend. Employ robust logging and monitoring to detect null pointer errors or service disruptions indicative of exploitation attempts. Network segmentation and access controls should restrict API access to trusted users and services to reduce the attack surface. Additionally, prepare incident response plans to quickly restore service availability in case of an attack. Engaging with the LibreChat community or vendor for timely updates and patches is also recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-8849: CWE-400 Uncontrolled Resource Consumption in danny-avila danny-avila/librechat
Description
LibreChat version 0.7.9 is vulnerable to a Denial of Service (DoS) attack due to unbounded parameter values in the `/api/memories` endpoint. The `key` and `value` parameters accept arbitrarily large inputs without proper validation, leading to a null pointer error in the Rust-based backend when excessively large values are submitted. This results in the inability to create new memories, impacting the stability of the service.
AI-Powered Analysis
Technical Analysis
CVE-2025-8849 identifies a vulnerability in the LibreChat open-source chat platform, specifically version 0.7.9, maintained by danny-avila. The issue lies in the /api/memories REST endpoint, which accepts 'key' and 'value' parameters without enforcing size constraints or input validation. Attackers can submit excessively large inputs to these parameters, causing the Rust-based backend to encounter a null pointer error. This error disrupts the memory creation functionality, effectively resulting in a Denial of Service (DoS) condition by preventing the system from processing legitimate memory creation requests. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that resource exhaustion or improper handling of resource limits leads to service instability. The CVSS v3.0 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity and availability but not confidentiality. No patches or mitigations have been officially published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability could be exploited remotely by authenticated users or services interacting with the API, potentially leading to service disruption and degraded user experience.
Potential Impact
For European organizations deploying LibreChat, this vulnerability poses a risk to service availability, particularly for applications relying on the memory feature to enhance chat interactions. A successful exploitation could disrupt operations, degrade user trust, and cause downtime, especially in environments where chatbots or AI assistants are integral to customer service or internal workflows. While confidentiality and data integrity are not directly impacted, the denial of service could indirectly affect business continuity and operational efficiency. Organizations with high dependency on LibreChat for real-time communication or AI-driven services may experience significant disruption. Additionally, if exploited in a targeted manner, it could be used as part of a broader attack to distract or degrade defenses. The lack of known exploits reduces immediate risk, but the medium severity score and ease of triggering the fault warrant proactive mitigation.
Mitigation Recommendations
European organizations should implement strict input validation and size limits on the 'key' and 'value' parameters at the API gateway or application firewall level to prevent excessively large payloads from reaching the backend. Rate limiting and anomaly detection should be employed to identify and block abnormal request patterns targeting the /api/memories endpoint. Where possible, update LibreChat to a patched version once available or apply custom patches to enforce input constraints within the Rust backend. Employ robust logging and monitoring to detect null pointer errors or service disruptions indicative of exploitation attempts. Network segmentation and access controls should restrict API access to trusted users and services to reduce the attack surface. Additionally, prepare incident response plans to quickly restore service availability in case of an attack. Engaging with the LibreChat community or vendor for timely updates and patches is also recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-08-10T18:16:35.321Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6903fb06aebfcd5474a51c4c
Added to database: 10/30/2025, 11:55:50 PM
Last enriched: 10/31/2025, 12:10:48 AM
Last updated: 10/31/2025, 5:02:24 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-50739: n/a
UnknownCVE-2025-50736: n/a
UnknownCVE-2025-11975: CWE-862 Missing Authorization in fusewp FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.)
MediumCVE-2025-11806: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in qzzr Qzzr Shortcode Plugin
MediumCVE-2025-23050: CWE-125 Out-of-bounds Read in Qt
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.