Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31945: CWE-918: Server-Side Request Forgery (SSRF) in danny-avila LibreChat

0
High
VulnerabilityCVE-2026-31945cvecve-2026-31945cwe-918
Published: Fri Mar 27 2026 (03/27/2026, 19:23:53 UTC)
Source: CVE Database V5
Vendor/Project: danny-avila
Product: LibreChat

Description

LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 through 0.8.2 are vulnerable to a server-side request forgery (SSRF) attack when using agent actions or MCP. Although a previous SSRF vulnerability (https://github.com/danny-avila/LibreChat/security/advisories/GHSA-rgjq-4q58-m3q8) was reported and patched, the fix only introduced hostname validation. It does not verify whether DNS resolution results in a private IP address. As a result, an attacker can still bypass the protection and gain access to internal resources, such as an internal RAG API or cloud instance metadata endpoints. Version 0.8.3-rc1 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 20:00:03 UTC

Technical Analysis

CVE-2026-31945 is a Server-Side Request Forgery (SSRF) vulnerability identified in the LibreChat project, a ChatGPT clone with extended features. The vulnerability exists in versions 0.8.2-rc2 through 0.8.2 and is triggered when using agent actions or the MCP feature. Although a prior SSRF vulnerability was patched by adding hostname validation, this fix was incomplete because it did not verify whether the DNS resolution of the hostname resulted in a private IP address. Consequently, attackers can craft requests that resolve to internal IP addresses, bypassing hostname checks and enabling unauthorized access to internal network resources. These resources may include internal Retrieval-Augmented Generation (RAG) APIs or cloud instance metadata endpoints, which often contain sensitive configuration or credential information. The vulnerability has a CVSS v3.1 base score of 7.7, reflecting its high severity, with an attack vector of network (remote), low attack complexity, requiring privileges but no user interaction, and impacting confidentiality with a scope change. The vulnerability is exploitable remotely by authenticated attackers with low privileges, and exploitation can lead to significant information disclosure. The issue was addressed in LibreChat version 0.8.3-rc1 by improving validation to prevent DNS resolution to private IP ranges. No known exploits are reported in the wild as of the publication date. This vulnerability highlights the importance of comprehensive SSRF mitigations that include IP address validation after DNS resolution, not just hostname checks.

Potential Impact

The impact of CVE-2026-31945 is significant for organizations deploying vulnerable versions of LibreChat, especially those exposing the service to untrusted networks or integrating it with sensitive internal APIs. Successful exploitation can lead to unauthorized access to internal network resources, including cloud metadata services that may leak credentials or configuration data, potentially enabling further lateral movement or privilege escalation. Confidentiality is primarily affected, as attackers can retrieve sensitive information from internal endpoints. The integrity and availability of the system are not directly impacted by this vulnerability. However, the breach of internal data can lead to broader security incidents. Organizations relying on LibreChat for chatbot or AI services in production environments may face data leakage risks and compliance issues. The vulnerability's ease of exploitation and the scope of affected systems make it a critical concern for enterprises using this software, particularly in cloud or hybrid environments where metadata endpoints are accessible internally.

Mitigation Recommendations

To mitigate CVE-2026-31945, organizations should immediately upgrade LibreChat to version 0.8.3-rc1 or later, where the vulnerability is patched. Beyond patching, it is crucial to implement network-level controls such as firewall rules or network segmentation to restrict access to internal services and cloud metadata endpoints from the LibreChat server. Employ strict egress filtering to prevent SSRF attempts from reaching sensitive internal IP ranges. Additionally, configure LibreChat and any integrated services to use allowlists for external requests rather than relying solely on hostname validation. Monitoring and logging outbound requests from LibreChat can help detect anomalous SSRF activity. If upgrading is not immediately feasible, consider disabling features like agent actions or MCP that trigger the vulnerability. Finally, conduct security assessments and penetration testing focused on SSRF vectors to ensure no residual exposure remains.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T15:10:10.656Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6de373c064ed76fea1d65

Added to database: 3/27/2026, 7:44:55 PM

Last enriched: 3/27/2026, 8:00:03 PM

Last updated: 3/27/2026, 11:41:29 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses