CVE-2025-69221

MEDIUM
2026-01-07 [email protected]
4.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Jan 15, 2026 - 21:45 vuln.today
Public exploit code
Patch Released
Jan 15, 2026 - 21:45 nvd
Patch available
CVE Published
Jan 07, 2026 - 21:15 nvd
MEDIUM 4.3

Description

LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 does not enforce proper access control when querying agent permissions. An authenticated attacker can read the permissions of arbitrary agents, even if they have no permissions for this agent. LibreChat allows the configuration of agents that have a predefined set of instructions and context. Private agents are not visible to other users. However, if an attacker knows the agent ID, they can read the permissions of the agent including the permissions individually assigned to other users. This issue is fixed in version 0.8.2-rc2.

Analysis

LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 does not enforce proper access control when querying agent permissions. [CVSS 4.3 MEDIUM]

Technical Context

Classified as CWE-284 (Improper Access Control). Affects Librechat. LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 does not enforce proper access control when

querying agent permissions. An authenticated attacker can read the permissions of arbitrary agents, even if they have no permissions for this agent. LibreChat allows the configuration of agents that have a predefined set of instructions and context. Private agents are not visible to other users. However, if an attacker knows the agent ID, they can read the permissions of the agent

Affected Products

Vendor: Librechat. Product: Librechat. Versions: up to 0.8.1.

Remediation

A vendor patch is available — apply it immediately. Fixed in version 0.8.2. Restrict network access to the affected service where possible.

Priority Score

42
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +22
POC: +20

Share

CVE-2025-69221 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy