CVE-2025-69222 PUBLISHED

LibreChat is vulnerable to Server-Side Request Forgery due to missing restrictions

Assigner: GitHub_M
Reserved: 29.12.2025 Published: 07.01.2026 Updated: 07.01.2026

LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 is prone to a server-side request forgery (SSRF) vulnerability due to missing restrictions of the Actions feature in the default configuration. LibreChat enables users to configure agents with predefined instructions and actions that can interact with remote services via OpenAPI specifications, supporting various HTTP methods, parameters, and authentication methods including custom headers. By default, there are no restrictions on accessible services, which means agents can also access internal components like the RAG API included in the default Docker Compose setup. This issue is fixed in version 0.8.1-rc2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
CVSS Score: 9.1

Product Status

Vendor danny-avila
Product LibreChat
Versions
  • Version >= 0.8.1-rc2, 0.8.2-rc2 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE