LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.
Metrics
Affected Vendors & Products
References
History
Sat, 29 Nov 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2. | |
| Title | LibreChat is Vulnerable to Server-Side Request Forgery (SSRF) in Actions Capability | |
| Weaknesses | CWE-20 CWE-918 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-29T01:26:18.757Z
Updated: 2025-11-29T01:26:18.757Z
Reserved: 2025-11-24T23:01:29.676Z
Link: CVE-2025-66201
No data.
Status : Received
Published: 2025-11-29T02:15:52.420
Modified: 2025-11-29T02:15:52.420
Link: CVE-2025-66201
No data.
ReportizFlow