Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8849: CWE-400 Uncontrolled Resource Consumption in danny-avila danny-avila/librechat

0
Medium
VulnerabilityCVE-2025-8849cvecve-2025-8849cwe-400
Published: Thu Oct 30 2025 (10/30/2025, 23:42:41 UTC)
Source: CVE Database V5
Vendor/Project: danny-avila
Product: danny-avila/librechat

Description

LibreChat version 0.7.9 is vulnerable to a Denial of Service (DoS) attack due to unbounded parameter values in the `/api/memories` endpoint. The `key` and `value` parameters accept arbitrarily large inputs without proper validation, leading to a null pointer error in the Rust-based backend when excessively large values are submitted. This results in the inability to create new memories, impacting the stability of the service.

AI-Powered Analysis

AILast updated: 10/31/2025, 00:10:48 UTC

Technical Analysis

CVE-2025-8849 identifies a vulnerability in the LibreChat open-source chat platform, specifically version 0.7.9, maintained by danny-avila. The issue lies in the /api/memories REST endpoint, which accepts 'key' and 'value' parameters without enforcing size constraints or input validation. Attackers can submit excessively large inputs to these parameters, causing the Rust-based backend to encounter a null pointer error. This error disrupts the memory creation functionality, effectively resulting in a Denial of Service (DoS) condition by preventing the system from processing legitimate memory creation requests. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that resource exhaustion or improper handling of resource limits leads to service instability. The CVSS v3.0 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity and availability but not confidentiality. No patches or mitigations have been officially published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability could be exploited remotely by authenticated users or services interacting with the API, potentially leading to service disruption and degraded user experience.

Potential Impact

For European organizations deploying LibreChat, this vulnerability poses a risk to service availability, particularly for applications relying on the memory feature to enhance chat interactions. A successful exploitation could disrupt operations, degrade user trust, and cause downtime, especially in environments where chatbots or AI assistants are integral to customer service or internal workflows. While confidentiality and data integrity are not directly impacted, the denial of service could indirectly affect business continuity and operational efficiency. Organizations with high dependency on LibreChat for real-time communication or AI-driven services may experience significant disruption. Additionally, if exploited in a targeted manner, it could be used as part of a broader attack to distract or degrade defenses. The lack of known exploits reduces immediate risk, but the medium severity score and ease of triggering the fault warrant proactive mitigation.

Mitigation Recommendations

European organizations should implement strict input validation and size limits on the 'key' and 'value' parameters at the API gateway or application firewall level to prevent excessively large payloads from reaching the backend. Rate limiting and anomaly detection should be employed to identify and block abnormal request patterns targeting the /api/memories endpoint. Where possible, update LibreChat to a patched version once available or apply custom patches to enforce input constraints within the Rust backend. Employ robust logging and monitoring to detect null pointer errors or service disruptions indicative of exploitation attempts. Network segmentation and access controls should restrict API access to trusted users and services to reduce the attack surface. Additionally, prepare incident response plans to quickly restore service availability in case of an attack. Engaging with the LibreChat community or vendor for timely updates and patches is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-08-10T18:16:35.321Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6903fb06aebfcd5474a51c4c

Added to database: 10/30/2025, 11:55:50 PM

Last enriched: 10/31/2025, 12:10:48 AM

Last updated: 10/31/2025, 5:02:24 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats