Filtered by vendor Librechat
Subscriptions
Filtered by product Librechat
Subscriptions
Total
14 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-11169 | 1 Librechat | 1 Librechat | 2025-07-15 | N/A |
An unhandled exception in danny-avila/librechat version 3c94ff2 can lead to a server crash. The issue occurs when the fs module throws an exception while handling file uploads. An unauthenticated user can trigger this exception by sending a specially crafted request, causing the server to crash. The vulnerability is fixed in version 0.7.6. | ||||
CVE-2024-11170 | 1 Librechat | 1 Librechat | 2025-07-15 | N/A |
A vulnerability in danny-avila/librechat version git 81f2936 allows for path traversal due to improper sanitization of file paths by the multer middleware. This can lead to arbitrary file write and potentially remote code execution. The issue is fixed in version 0.7.6. | ||||
CVE-2024-11171 | 1 Librechat | 1 Librechat | 2025-07-15 | N/A |
In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit on the upload file size. This can lead to a server crash due to out-of-memory errors when handling large files. An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. The issue is fixed in version 0.7.6. | ||||
CVE-2024-11172 | 1 Librechat | 1 Librechat | 2025-07-15 | N/A |
A vulnerability in danny-avila/librechat version git a1647d7 allows an unauthenticated attacker to cause a denial of service by sending a crafted payload to the server. The middleware `checkBan` is not surrounded by a try-catch block, and an unhandled exception will cause the server to crash. This issue is fixed in version 0.7.6. | ||||
CVE-2024-11173 | 1 Librechat | 1 Librechat | 2025-07-15 | N/A |
An unhandled exception in the danny-avila/librechat repository, version git 600d217, can cause the server to crash, leading to a full denial of service. This issue occurs when certain API endpoints receive malformed input, resulting in an uncaught exception. Although a valid JWT is required to exploit this vulnerability, LibreChat allows open registration, enabling unauthenticated attackers to create an account and perform the attack. The issue is fixed in version 0.7.6. | ||||
CVE-2024-11167 | 1 Librechat | 1 Librechat | 2025-07-15 | 5.3 Medium |
An improper access control vulnerability in danny-avila/librechat versions prior to 0.7.6 allows authenticated users to delete other users' prompts via the groupid parameter. This issue occurs because the endpoint does not verify whether the provided prompt ID belongs to the current user. | ||||
CVE-2024-10366 | 1 Librechat | 1 Librechat | 2025-07-15 | 6.5 Medium |
An improper access control vulnerability (IDOR) exists in the delete attachments functionality of danny-avila/librechat version v0.7.5-rc2. The endpoint does not verify whether the provided attachment ID belongs to the current user, allowing any authenticated user to delete attachments of other users. | ||||
CVE-2024-12580 | 1 Librechat | 1 Librechat | 2025-07-14 | 5.3 Medium |
A vulnerability in danny-avila/librechat prior to version 0.7.6 allows for logs debug injection. The parameters sessionId, fileId, userId, and file_id in the /code/download/:sessionId/:fileId and /download/:userId/:file_id APIs are not validated or filtered, leading to potential log injection attacks. This can cause distortion of monitoring and investigation information, evade detection from security systems, and create difficulties in maintenance and operation. | ||||
CVE-2024-10359 | 1 Librechat | 1 Librechat | 2025-07-11 | N/A |
In danny-avila/librechat version v0.7.5-rc2, a vulnerability exists in the preset creation functionality where a user can manipulate the user ID field through mass assignment. This allows an attacker to inject a different user ID into the preset object, causing the preset to appear in the UI of another user. The vulnerability arises because the backend saves the entire object received without validating the attributes and their values, impacting both integrity and confidentiality. | ||||
CVE-2024-10361 | 1 Librechat | 1 Librechat | 2025-07-11 | 9.1 Critical |
An arbitrary file deletion vulnerability exists in danny-avila/librechat version v0.7.5-rc2, specifically within the /api/files endpoint. This vulnerability arises from improper input validation, allowing path traversal techniques to delete arbitrary files on the server. Attackers can exploit this to bypass security mechanisms and delete files outside the intended directory, including critical system files, user data, or application resources. This vulnerability impacts the integrity and availability of the system. | ||||
CVE-2024-10363 | 1 Librechat | 1 Librechat | 2025-07-11 | N/A |
In version 0.7.5 of danny-avila/LibreChat, there is an improper access control vulnerability. Users can share, use, and create prompts without being granted permission by the admin. This can break application logic and permissions, allowing unauthorized actions. | ||||
CVE-2024-52787 | 1 Librechat | 1 Librechat | 2024-11-27 | 9.1 Critical |
An issue in the upload_documents method of libre-chat v0.0.6 allows attackers to execute a path traversal via supplying a crafted filename in an uploaded file. | ||||
CVE-2024-41704 | 1 Librechat | 1 Librechat | 2024-11-21 | 9.8 Critical |
LibreChat through 0.7.4-rc1 does not validate the normalized pathnames of images. | ||||
CVE-2024-41703 | 1 Librechat | 1 Librechat | 2024-11-21 | 9.8 Critical |
LibreChat through 0.7.4-rc1 has incorrect access control for message updates. |
Page 1 of 1.