LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.
History

Sat, 29 Nov 2025 02:00:00 +0000

Type Values Removed Values Added
Description LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.
Title LibreChat is Vulnerable to Server-Side Request Forgery (SSRF) in Actions Capability
Weaknesses CWE-20
CWE-918
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-29T01:26:18.757Z

Updated: 2025-11-29T01:26:18.757Z

Reserved: 2025-11-24T23:01:29.676Z

Link: CVE-2025-66201

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-29T02:15:52.420

Modified: 2025-11-29T02:15:52.420

Link: CVE-2025-66201

cve-icon Redhat

No data.