CVE-2026-31945: CWE-918: Server-Side Request Forgery (SSRF) in danny-avila LibreChat
LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 through 0.8.2 are vulnerable to a server-side request forgery (SSRF) attack when using agent actions or MCP. Although a previous SSRF vulnerability (https://github.com/danny-avila/LibreChat/security/advisories/GHSA-rgjq-4q58-m3q8) was reported and patched, the fix only introduced hostname validation. It does not verify whether DNS resolution results in a private IP address. As a result, an attacker can still bypass the protection and gain access to internal resources, such as an internal RAG API or cloud instance metadata endpoints. Version 0.8.3-rc1 contains a patch.
AI Analysis
Technical Summary
CVE-2026-31945 is a Server-Side Request Forgery (SSRF) vulnerability identified in the LibreChat project, a ChatGPT clone with extended features. The vulnerability exists in versions 0.8.2-rc2 through 0.8.2 and is triggered when using agent actions or the MCP feature. Although a prior SSRF vulnerability was patched by adding hostname validation, this fix was incomplete because it did not verify whether the DNS resolution of the hostname resulted in a private IP address. Consequently, attackers can craft requests that resolve to internal IP addresses, bypassing hostname checks and enabling unauthorized access to internal network resources. These resources may include internal Retrieval-Augmented Generation (RAG) APIs or cloud instance metadata endpoints, which often contain sensitive configuration or credential information. The vulnerability has a CVSS v3.1 base score of 7.7, reflecting its high severity, with an attack vector of network (remote), low attack complexity, requiring privileges but no user interaction, and impacting confidentiality with a scope change. The vulnerability is exploitable remotely by authenticated attackers with low privileges, and exploitation can lead to significant information disclosure. The issue was addressed in LibreChat version 0.8.3-rc1 by improving validation to prevent DNS resolution to private IP ranges. No known exploits are reported in the wild as of the publication date. This vulnerability highlights the importance of comprehensive SSRF mitigations that include IP address validation after DNS resolution, not just hostname checks.
Potential Impact
The impact of CVE-2026-31945 is significant for organizations deploying vulnerable versions of LibreChat, especially those exposing the service to untrusted networks or integrating it with sensitive internal APIs. Successful exploitation can lead to unauthorized access to internal network resources, including cloud metadata services that may leak credentials or configuration data, potentially enabling further lateral movement or privilege escalation. Confidentiality is primarily affected, as attackers can retrieve sensitive information from internal endpoints. The integrity and availability of the system are not directly impacted by this vulnerability. However, the breach of internal data can lead to broader security incidents. Organizations relying on LibreChat for chatbot or AI services in production environments may face data leakage risks and compliance issues. The vulnerability's ease of exploitation and the scope of affected systems make it a critical concern for enterprises using this software, particularly in cloud or hybrid environments where metadata endpoints are accessible internally.
Mitigation Recommendations
To mitigate CVE-2026-31945, organizations should immediately upgrade LibreChat to version 0.8.3-rc1 or later, where the vulnerability is patched. Beyond patching, it is crucial to implement network-level controls such as firewall rules or network segmentation to restrict access to internal services and cloud metadata endpoints from the LibreChat server. Employ strict egress filtering to prevent SSRF attempts from reaching sensitive internal IP ranges. Additionally, configure LibreChat and any integrated services to use allowlists for external requests rather than relying solely on hostname validation. Monitoring and logging outbound requests from LibreChat can help detect anomalous SSRF activity. If upgrading is not immediately feasible, consider disabling features like agent actions or MCP that trigger the vulnerability. Finally, conduct security assessments and penetration testing focused on SSRF vectors to ensure no residual exposure remains.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-31945: CWE-918: Server-Side Request Forgery (SSRF) in danny-avila LibreChat
Description
LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 through 0.8.2 are vulnerable to a server-side request forgery (SSRF) attack when using agent actions or MCP. Although a previous SSRF vulnerability (https://github.com/danny-avila/LibreChat/security/advisories/GHSA-rgjq-4q58-m3q8) was reported and patched, the fix only introduced hostname validation. It does not verify whether DNS resolution results in a private IP address. As a result, an attacker can still bypass the protection and gain access to internal resources, such as an internal RAG API or cloud instance metadata endpoints. Version 0.8.3-rc1 contains a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-31945 is a Server-Side Request Forgery (SSRF) vulnerability identified in the LibreChat project, a ChatGPT clone with extended features. The vulnerability exists in versions 0.8.2-rc2 through 0.8.2 and is triggered when using agent actions or the MCP feature. Although a prior SSRF vulnerability was patched by adding hostname validation, this fix was incomplete because it did not verify whether the DNS resolution of the hostname resulted in a private IP address. Consequently, attackers can craft requests that resolve to internal IP addresses, bypassing hostname checks and enabling unauthorized access to internal network resources. These resources may include internal Retrieval-Augmented Generation (RAG) APIs or cloud instance metadata endpoints, which often contain sensitive configuration or credential information. The vulnerability has a CVSS v3.1 base score of 7.7, reflecting its high severity, with an attack vector of network (remote), low attack complexity, requiring privileges but no user interaction, and impacting confidentiality with a scope change. The vulnerability is exploitable remotely by authenticated attackers with low privileges, and exploitation can lead to significant information disclosure. The issue was addressed in LibreChat version 0.8.3-rc1 by improving validation to prevent DNS resolution to private IP ranges. No known exploits are reported in the wild as of the publication date. This vulnerability highlights the importance of comprehensive SSRF mitigations that include IP address validation after DNS resolution, not just hostname checks.
Potential Impact
The impact of CVE-2026-31945 is significant for organizations deploying vulnerable versions of LibreChat, especially those exposing the service to untrusted networks or integrating it with sensitive internal APIs. Successful exploitation can lead to unauthorized access to internal network resources, including cloud metadata services that may leak credentials or configuration data, potentially enabling further lateral movement or privilege escalation. Confidentiality is primarily affected, as attackers can retrieve sensitive information from internal endpoints. The integrity and availability of the system are not directly impacted by this vulnerability. However, the breach of internal data can lead to broader security incidents. Organizations relying on LibreChat for chatbot or AI services in production environments may face data leakage risks and compliance issues. The vulnerability's ease of exploitation and the scope of affected systems make it a critical concern for enterprises using this software, particularly in cloud or hybrid environments where metadata endpoints are accessible internally.
Mitigation Recommendations
To mitigate CVE-2026-31945, organizations should immediately upgrade LibreChat to version 0.8.3-rc1 or later, where the vulnerability is patched. Beyond patching, it is crucial to implement network-level controls such as firewall rules or network segmentation to restrict access to internal services and cloud metadata endpoints from the LibreChat server. Employ strict egress filtering to prevent SSRF attempts from reaching sensitive internal IP ranges. Additionally, configure LibreChat and any integrated services to use allowlists for external requests rather than relying solely on hostname validation. Monitoring and logging outbound requests from LibreChat can help detect anomalous SSRF activity. If upgrading is not immediately feasible, consider disabling features like agent actions or MCP that trigger the vulnerability. Finally, conduct security assessments and penetration testing focused on SSRF vectors to ensure no residual exposure remains.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-10T15:10:10.656Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c6de373c064ed76fea1d65
Added to database: 3/27/2026, 7:44:55 PM
Last enriched: 3/27/2026, 8:00:03 PM
Last updated: 3/27/2026, 11:41:29 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.