Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 01 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librechat
Librechat librechat |
|
| Vendors & Products |
Librechat
Librechat librechat |
Mon, 01 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 29 Nov 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2. | |
| Title | LibreChat is Vulnerable to Server-Side Request Forgery (SSRF) in Actions Capability | |
| Weaknesses | CWE-20 CWE-918 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-01T14:11:07.641Z
Reserved: 2025-11-24T23:01:29.676Z
Link: CVE-2025-66201
Updated: 2025-12-01T13:53:51.175Z
Status : Awaiting Analysis
Published: 2025-11-29T02:15:52.420
Modified: 2025-12-01T15:39:33.110
Link: CVE-2025-66201
No data.
OpenCVE Enrichment
Updated: 2025-12-01T15:18:26Z