Search Results (28 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-11173 1 Librechat 1 Librechat 2025-07-15 N/A
An unhandled exception in the danny-avila/librechat repository, version git 600d217, can cause the server to crash, leading to a full denial of service. This issue occurs when certain API endpoints receive malformed input, resulting in an uncaught exception. Although a valid JWT is required to exploit this vulnerability, LibreChat allows open registration, enabling unauthenticated attackers to create an account and perform the attack. The issue is fixed in version 0.7.6.
CVE-2024-11167 1 Librechat 1 Librechat 2025-07-15 5.3 Medium
An improper access control vulnerability in danny-avila/librechat versions prior to 0.7.6 allows authenticated users to delete other users' prompts via the groupid parameter. This issue occurs because the endpoint does not verify whether the provided prompt ID belongs to the current user.
CVE-2024-10366 1 Librechat 1 Librechat 2025-07-15 6.5 Medium
An improper access control vulnerability (IDOR) exists in the delete attachments functionality of danny-avila/librechat version v0.7.5-rc2. The endpoint does not verify whether the provided attachment ID belongs to the current user, allowing any authenticated user to delete attachments of other users.
CVE-2024-12580 1 Librechat 1 Librechat 2025-07-14 5.3 Medium
A vulnerability in danny-avila/librechat prior to version 0.7.6 allows for logs debug injection. The parameters sessionId, fileId, userId, and file_id in the /code/download/:sessionId/:fileId and /download/:userId/:file_id APIs are not validated or filtered, leading to potential log injection attacks. This can cause distortion of monitoring and investigation information, evade detection from security systems, and create difficulties in maintenance and operation.
CVE-2024-10359 1 Librechat 1 Librechat 2025-07-11 N/A
In danny-avila/librechat version v0.7.5-rc2, a vulnerability exists in the preset creation functionality where a user can manipulate the user ID field through mass assignment. This allows an attacker to inject a different user ID into the preset object, causing the preset to appear in the UI of another user. The vulnerability arises because the backend saves the entire object received without validating the attributes and their values, impacting both integrity and confidentiality.
CVE-2024-52787 1 Librechat 1 Librechat 2024-11-27 9.1 Critical
An issue in the upload_documents method of libre-chat v0.0.6 allows attackers to execute a path traversal via supplying a crafted filename in an uploaded file.
CVE-2024-41704 1 Librechat 1 Librechat 2024-11-21 9.8 Critical
LibreChat through 0.7.4-rc1 does not validate the normalized pathnames of images.
CVE-2024-41703 1 Librechat 1 Librechat 2024-11-21 9.8 Critical
LibreChat through 0.7.4-rc1 has incorrect access control for message updates.