LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Dec 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:* cpe:2.3:a:librechat:librechat:0.8.1:-:*:*:*:*:*:* cpe:2.3:a:librechat:librechat:0.8.1:rc1:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Mon, 01 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librechat
Librechat librechat |
|
| Vendors & Products |
Librechat
Librechat librechat |
Mon, 01 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 29 Nov 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2. | |
| Title | LibreChat is Vulnerable to Server-Side Request Forgery (SSRF) in Actions Capability | |
| Weaknesses | CWE-20 CWE-918 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-29T01:26:18.757Z
Updated: 2025-12-01T14:11:07.641Z
Reserved: 2025-11-24T23:01:29.676Z
Link: CVE-2025-66201
Updated: 2025-12-01T13:53:51.175Z
Status : Analyzed
Published: 2025-11-29T02:15:52.420
Modified: 2025-12-03T21:49:38.910
Link: CVE-2025-66201
No data.