CVE-2025-69222

CRITICAL
2026-01-07 [email protected]
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Jan 15, 2026 - 21:36 vuln.today
Public exploit code
Patch Released
Jan 15, 2026 - 21:36 nvd
Patch available
CVE Published
Jan 07, 2026 - 22:15 nvd
CRITICAL 9.1

Description

LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 is prone to a server-side request forgery (SSRF) vulnerability due to missing restrictions of the Actions feature in the default configuration. LibreChat enables users to configure agents with predefined instructions and actions that can interact with remote services via OpenAPI specifications, supporting various HTTP methods, parameters, and authentication methods including custom headers. By default, there are no restrictions on accessible services, which means agents can also access internal components like the RAG API included in the default Docker Compose setup. This issue is fixed in version 0.8.1-rc2.

Analysis

LibreChat 0.8.1-rc2 has SSRF in the Actions feature that allows authenticated users to make the server perform requests to internal networks. By configuring agents with malicious OpenAPI specifications, attackers can scan internal infrastructure and access internal services. PoC available, patch available.

Technical Context

The Actions feature allows configuring agents with OpenAPI specifications that define HTTP endpoints (CWE-918). The server makes requests to these endpoints without validating that they are external. An authenticated user can specify internal IP addresses, accessing cloud metadata services, internal APIs, and other restricted resources.

Affected Products

LibreChat 0.8.1-rc2

Remediation

Update LibreChat. Implement SSRF protections: block requests to private IP ranges, cloud metadata services, and localhost.

Priority Score

66
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +46
POC: +20

Share

CVE-2025-69222 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy