Vulnerability Description
LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allowing any authenticated user to execute shell commands as root inside the container through a single API request. This vulnerability is fixed in v0.8.2-rc2.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Librechat | Librechat | 0.8.2 |
Related Weaknesses (CWE)
References
- https://github.com/danny-avila/LibreChat/commit/211b39f3113d4e6ecab84be0a83f4e9cPatch
- https://github.com/danny-avila/LibreChat/security/advisories/GHSA-cxhj-j78r-p88fExploitVendor Advisory
FAQ
What is CVE-2026-22252?
CVE-2026-22252 is a vulnerability with a CVSS score of 9.1 (CRITICAL). LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allowing any authenticated user to execute sh...
How severe is CVE-2026-22252?
CVE-2026-22252 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-22252?
Check the references section above for vendor advisories and patch information. Affected products include: Librechat Librechat.