CVE-2025-66201

LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.
CVSS

No CVSS.

Configurations

No configuration.

History

01 Dec 2025, 14:16

Type Values Removed Values Added
References () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-7m2q-fjwr-5x8v - () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-7m2q-fjwr-5x8v -

29 Nov 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-29 02:15

Updated : 2025-12-01 15:39


NVD link : CVE-2025-66201

Mitre link : CVE-2025-66201

CVE.ORG link : CVE-2025-66201


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation

CWE-918

Server-Side Request Forgery (SSRF)