Vulnerability Description
LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Actions" feature and making the LLM use those actions. It could be used by an authenticated user with access to this feature to access URLs only accessible to the LibreChat server (such as cloud metadata services, through which impersonation of the server might be possible). This issue has been patched in version 0.8.1-rc2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Librechat | Librechat | < 0.8.1 |
Related Weaknesses (CWE)
References
- https://github.com/danny-avila/LibreChat/security/advisories/GHSA-7m2q-fjwr-5x8vExploitVendor Advisory
- https://github.com/danny-avila/LibreChat/security/advisories/GHSA-7m2q-fjwr-5x8vExploitVendor Advisory
FAQ
What is CVE-2025-66201?
CVE-2025-66201 is a vulnerability with a CVSS score of 8.1 (HIGH). LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.1-rc2, LibreChat is vulnerable to Server-side Request Forgery (SSRF), by passing specially crafted OpenAPI specs to its "Act...
How severe is CVE-2025-66201?
CVE-2025-66201 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-66201?
Check the references section above for vendor advisories and patch information. Affected products include: Librechat Librechat.