Description
Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be modified to scan an internal network in the target lobe-web environment. This issue has been addressed in release version 1.19.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Published: 2024-11-26
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-3338 Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be modified to scan an internal network in the target lobe-web environment. This issue has been addressed in release version 1.19.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Github GHSA Github GHSA GHSA-2xcc-vm3f-m8rw @lobehub/chat Server Side Request Forgery vulnerability
History

Tue, 26 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Lobehub
Lobehub lobe Chat
CPEs cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*
Vendors & Products Lobehub
Lobehub lobe Chat
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 26 Nov 2024 18:45:00 +0000

Type Values Removed Values Added
Description Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be modified to scan an internal network in the target lobe-web environment. This issue has been addressed in release version 1.19.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Title ssrf vulnerability in lobe-chat
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}


Subscriptions

Lobehub Lobe Chat
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-11-26T18:48:27.413Z

Reserved: 2024-04-22T15:14:59.165Z

Link: CVE-2024-32965

cve-icon Vulnrichment

Updated: 2024-11-26T18:48:23.333Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-26T19:15:23.343

Modified: 2025-09-23T14:16:58.173

Link: CVE-2024-32965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses