A mass assignment vulnerability exists in danny-avila/librechat, affecting all versions. This vulnerability allows attackers to manipulate sensitive fields by automatically binding user-provided data to internal object properties or database fields without proper filtering. As a result, any extra fields in the request body are included in agentData and passed to the database layer, allowing overwriting of any field in the schema, such as author, access_level, isCollaborative, and projectIds. Additionally, the Object.Prototype can be polluted due to the use of Object.assign with spread operators.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/librechat/commit/a37bf6719cfbc2de270f7d87b6b85d87cc1768db | Patch |
| https://huntr.com/bounties/32a175c4-7543-4503-a3d0-7880abd1826b | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-29 17:15
Updated : 2025-10-16 16:45
NVD link : CVE-2025-7104
Mitre link : CVE-2025-7104
CVE.ORG link : CVE-2025-7104
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-915
Improperly Controlled Modification of Dynamically-Determined Object Attributes
