Vulnerabilities
Vulnerable Software
Librechat:  >> Librechat  >> 0.3.0  Security Vulnerabilities
A vulnerability in danny-avila/librechat prior to version 0.7.6 allows for logs debug injection. The parameters sessionId, fileId, userId, and file_id in the /code/download/:sessionId/:fileId and /download/:userId/:file_id APIs are not validated or filtered, leading to potential log injection attacks. This can cause distortion of monitoring and investigation information, evade detection from security systems, and create difficulties in maintenance and operation.
CVSS Score
4.3
EPSS Score
0.0
Published
2025-03-20
An improper access control vulnerability in danny-avila/librechat versions prior to 0.7.6 allows authenticated users to delete other users' prompts via the groupid parameter. This issue occurs because the endpoint does not verify whether the provided prompt ID belongs to the current user.
CVSS Score
9.4
EPSS Score
0.001
Published
2025-03-20
An unhandled exception in danny-avila/librechat version 3c94ff2 can lead to a server crash. The issue occurs when the fs module throws an exception while handling file uploads. An unauthenticated user can trigger this exception by sending a specially crafted request, causing the server to crash. The vulnerability is fixed in version 0.7.6.
CVSS Score
7.5
EPSS Score
0.002
Published
2025-03-20
A vulnerability in danny-avila/librechat version git 81f2936 allows for path traversal due to improper sanitization of file paths by the multer middleware. This can lead to arbitrary file write and potentially remote code execution. The issue is fixed in version 0.7.6.
CVSS Score
8.8
EPSS Score
0.014
Published
2025-03-20
In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit on the upload file size. This can lead to a server crash due to out-of-memory errors when handling large files. An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. The issue is fixed in version 0.7.6.
CVSS Score
7.5
EPSS Score
0.002
Published
2025-03-20
A vulnerability in danny-avila/librechat version git a1647d7 allows an unauthenticated attacker to cause a denial of service by sending a crafted payload to the server. The middleware `checkBan` is not surrounded by a try-catch block, and an unhandled exception will cause the server to crash. This issue is fixed in version 0.7.6.
CVSS Score
7.5
EPSS Score
0.003
Published
2025-03-20
An unhandled exception in the danny-avila/librechat repository, version git 600d217, can cause the server to crash, leading to a full denial of service. This issue occurs when certain API endpoints receive malformed input, resulting in an uncaught exception. Although a valid JWT is required to exploit this vulnerability, LibreChat allows open registration, enabling unauthenticated attackers to create an account and perform the attack. The issue is fixed in version 0.7.6.
CVSS Score
6.5
EPSS Score
0.003
Published
2025-03-20
LibreChat through 0.7.4-rc1 has incorrect access control for message updates.
CVSS Score
9.8
EPSS Score
0.001
Published
2024-07-22
LibreChat through 0.7.4-rc1 does not validate the normalized pathnames of images.
CVSS Score
9.8
EPSS Score
0.004
Published
2024-07-22


Contact Us

Shodan ® - All rights reserved