CVE-2025-66451
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-15
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| librechat | librechat | to 0.8.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-915 | The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified. |
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in LibreChat versions 0.8.0 and below allows users to send JSON PATCH requests to modify prompt groups without proper validation. The request body is passed directly to the update function without filtering sensitive fields, enabling users to alter prompts in unintended ways beyond the front end's intended capabilities. This issue is fixed in version 0.8.1.
How can this vulnerability impact me? :
The vulnerability can allow unauthorized modification of prompt data, potentially leading to misuse or manipulation of the chat system's behavior. Since sensitive fields are not filtered, attackers might alter prompts in ways that could compromise the integrity or expected functionality of the application.
What immediate steps should I take to mitigate this vulnerability?
Upgrade LibreChat to version 0.8.1 or later, as this version contains the fix for the vulnerability related to insufficient validation of JSON requests in the PATCH endpoint for prompt groups.