Description
LibreChat is a ChatGPT clone with additional features. Prior to 0.8.3-rc1, a Denial of Service (DoS) vulnerability exists in the DELETE /api/convos endpoint that allows an authenticated attacker to crash the Node.js server process by sending malformed requests. The DELETE /api/convos route handler attempts to destructure req.body.arg without validating that it exists. The server crashes due to an unhandled TypeError that bypasses Express error handling middleware and triggers process.exit(1). This vulnerability is fixed in 0.8.3-rc1.
Published: 2026-03-13
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability exists in LibreChat versions prior to 0.8.3-rc1 on the DELETE /api/convos endpoint. The route handler attempts to destructure req.body.arg without validating its presence, resulting in an unhandled TypeError. This throws an exception that bypasses Express error handling middleware and triggers process.exit(1), causing the Node.js server process to crash. The effect is an application crash that renders the chat service unavailable to all users until the server is restarted or upgraded. The weakness is identified as CWE-248 (Unchecked Return Value).

Affected Systems

The affected product is LibreChat, authored by danny-avila, on all releases before 0.8.3-rc1. Versions beyond 0.8.3-rc1 contain the fix and are not affected.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. The EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog, implying no known active exploitation. Based on the description, the likely attack vector is a remote or network‐based attack performed by an authenticated user who can send DELETE requests to the endpoint. An attacker can force the server to crash, temporarily denying availability for legitimate users.

Generated by OpenCVE AI on March 17, 2026 at 13:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LibreChat to version 0.8.3-rc1 or later.

Generated by OpenCVE AI on March 17, 2026 at 13:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Librechat
Librechat librechat
CPEs cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*
Vendors & Products Librechat
Librechat librechat

Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Danny-avila
Danny-avila libre Chat
Vendors & Products Danny-avila
Danny-avila libre Chat

Fri, 13 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description LibreChat is a ChatGPT clone with additional features. Prior to 0.8.3-rc1, a Denial of Service (DoS) vulnerability exists in the DELETE /api/convos endpoint that allows an authenticated attacker to crash the Node.js server process by sending malformed requests. The DELETE /api/convos route handler attempts to destructure req.body.arg without validating that it exists. The server crashes due to an unhandled TypeError that bypasses Express error handling middleware and triggers process.exit(1). This vulnerability is fixed in 0.8.3-rc1.
Title LibreChat Denial of Service (DoS) via Unhandled Exception in DELETE /api/convos
Weaknesses CWE-248
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Danny-avila Libre Chat
Librechat Librechat
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T13:43:45.488Z

Reserved: 2026-03-10T15:10:10.657Z

Link: CVE-2026-31949

cve-icon Vulnrichment

Updated: 2026-03-16T13:43:31.752Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:39.753

Modified: 2026-03-17T12:26:45.177

Link: CVE-2026-31949

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:40:07Z

Weaknesses