CVE-2026-31945

LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 through 0.8.2 are vulnerable to a server-side request forgery (SSRF) attack when using agent actions or MCP. Although a previous SSRF vulnerability (https://github.com/danny-avila/LibreChat/security/advisories/GHSA-rgjq-4q58-m3q8) was reported and patched, the fix only introduced hostname validation. It does not verify whether DNS resolution results in a private IP address. As a result, an attacker can still bypass the protection and gain access to internal resources, such as an internal RAG API or cloud instance metadata endpoints. Version 0.8.3-rc1 contains a patch.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:librechat:librechat:0.8.2:-:*:*:*:*:*:*
cpe:2.3:a:librechat:librechat:0.8.2:rc2:*:*:*:*:*:*
cpe:2.3:a:librechat:librechat:0.8.2:rc3:*:*:*:*:*:*

History

30 Mar 2026, 20:35

Type Values Removed Values Added
References () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-f92m-jpv7-55p2 - () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-f92m-jpv7-55p2 - Exploit, Vendor Advisory, Mitigation
CPE cpe:2.3:a:librechat:librechat:0.8.2:rc3:*:*:*:*:*:*
cpe:2.3:a:librechat:librechat:0.8.2:-:*:*:*:*:*:*
cpe:2.3:a:librechat:librechat:0.8.2:rc2:*:*:*:*:*:*
First Time Librechat
Librechat librechat

30 Mar 2026, 20:16

Type Values Removed Values Added
References () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-f92m-jpv7-55p2 - () https://github.com/danny-avila/LibreChat/security/advisories/GHSA-f92m-jpv7-55p2 -

Information

Published : 2026-03-27 20:16

Updated : 2026-03-30 20:35


NVD link : CVE-2026-31945

Mitre link : CVE-2026-31945

CVE.ORG link : CVE-2026-31945


JSON object : View

Products Affected

librechat

  • librechat
CWE
CWE-918

Server-Side Request Forgery (SSRF)