LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 through 0.8.2 are vulnerable to a server-side request forgery (SSRF) attack when using agent actions or MCP. Although a previous SSRF vulnerability (https://github.com/danny-avila/LibreChat/security/advisories/GHSA-rgjq-4q58-m3q8) was reported and patched, the fix only introduced hostname validation. It does not verify whether DNS resolution results in a private IP address. As a result, an attacker can still bypass the protection and gain access to internal resources, such as an internal RAG API or cloud instance metadata endpoints. Version 0.8.3-rc1 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/LibreChat/security/advisories/GHSA-f92m-jpv7-55p2 | Exploit Vendor Advisory Mitigation |
| https://github.com/danny-avila/LibreChat/security/advisories/GHSA-f92m-jpv7-55p2 | Exploit Vendor Advisory Mitigation |
Configurations
Configuration 1 (hide)
|
History
30 Mar 2026, 20:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-f92m-jpv7-55p2 - Exploit, Vendor Advisory, Mitigation | |
| CPE | cpe:2.3:a:librechat:librechat:0.8.2:rc3:*:*:*:*:*:* cpe:2.3:a:librechat:librechat:0.8.2:-:*:*:*:*:*:* cpe:2.3:a:librechat:librechat:0.8.2:rc2:*:*:*:*:*:* |
|
| First Time |
Librechat
Librechat librechat |
30 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-f92m-jpv7-55p2 - |
Information
Published : 2026-03-27 20:16
Updated : 2026-03-30 20:35
NVD link : CVE-2026-31945
Mitre link : CVE-2026-31945
CVE.ORG link : CVE-2026-31945
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-918
Server-Side Request Forgery (SSRF)
