Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librechat
Librechat librechat |
|
| Vendors & Products |
Librechat
Librechat librechat |
Thu, 11 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1. | |
| Title | LibreChat JSON Injection in Chat POST Allows Remote Resource Inclusion and PXSS via Image Upload | |
| Weaknesses | CWE-80 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-12T19:30:38.502Z
Reserved: 2025-12-01T18:22:06.865Z
Link: CVE-2025-66450
Updated: 2025-12-12T19:30:35.493Z
Status : Undergoing Analysis
Published: 2025-12-11T22:15:56.153
Modified: 2025-12-12T15:17:31.973
Link: CVE-2025-66450
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:48:41Z