CVE-2025-8848
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-30
Assigner: huntr.dev
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| librechat | librechat | 0.7.9 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in danny-avila/librechat version 0.7.9 allows an attacker to inject arbitrary HTML into the <html lang=""> tag of the response by sending a crafted Accept-Language HTTP header while logged in. This is an HTML injection vulnerability that can lead to cross-site scripting (XSS) attacks.
How can this vulnerability impact me? :
The vulnerability can allow attackers to perform cross-site scripting (XSS) attacks, which may lead to unauthorized actions on behalf of the user, theft of sensitive information, or manipulation of the web application's content.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by sending HTTP GET requests with crafted Accept-Language headers to the affected version of danny-avila/librechat (0.7.9) and observing if arbitrary HTML is injected into the <html lang=""> tag of the response. For example, using curl: curl -H "Accept-Language: <script>alert(1)</script>" http://target-system/ and then inspecting the response HTML for injected content. Monitoring web server logs for unusual Accept-Language header values may also help identify attempts to exploit this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating danny-avila/librechat to a version that fixes this vulnerability if available, or applying input validation and sanitization on the Accept-Language header to prevent HTML injection. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of potential XSS attacks. Restricting or monitoring HTTP headers for suspicious input can also reduce risk.