Vulnerability Description
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Librechat | Librechat | < 0.8.1 |
Related Weaknesses (CWE)
References
- https://github.com/danny-avila/LibreChat/commit/6fa94d3eb8f5779363226d10dccf8b01Patch
- https://github.com/danny-avila/LibreChat/security/advisories/GHSA-84vx-vmcf-xgppExploitVendor Advisory
FAQ
What is CVE-2025-66450?
CVE-2025-66450 is a vulnerability with a CVSS score of 5.4 (MEDIUM). LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The maliciou...
How severe is CVE-2025-66450?
CVE-2025-66450 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-66450?
Check the references section above for vendor advisories and patch information. Affected products include: Librechat Librechat.