Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librechat
Librechat librechat |
|
| Vendors & Products |
Librechat
Librechat librechat |
Thu, 11 Dec 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1. | |
| Title | LibreChat's Improper Input Validation in Prompt Creation API Enables Unauthorized Permission Changes | |
| Weaknesses | CWE-20 CWE-915 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-12T19:29:24.539Z
Reserved: 2025-12-01T18:44:35.638Z
Link: CVE-2025-66451
Updated: 2025-12-12T19:29:21.553Z
Status : Undergoing Analysis
Published: 2025-12-11T23:15:50.690
Modified: 2025-12-12T15:17:31.973
Link: CVE-2025-66451
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:48:41Z