CVE-2025-66451
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-11

Last updated on: 2025-12-15

Assigner: GitHub, Inc.

Description
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-11
Last Modified
2025-12-15
Generated
2026-05-07
AI Q&A
2025-12-12
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
librechat librechat to 0.8.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-915 The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in LibreChat versions 0.8.0 and below allows users to send JSON PATCH requests to modify prompt groups without proper validation. The request body is passed directly to the update function without filtering sensitive fields, enabling users to alter prompts in unintended ways beyond the front end's intended capabilities. This issue is fixed in version 0.8.1.


How can this vulnerability impact me? :

The vulnerability can allow unauthorized modification of prompt data, potentially leading to misuse or manipulation of the chat system's behavior. Since sensitive fields are not filtered, attackers might alter prompts in ways that could compromise the integrity or expected functionality of the application.


What immediate steps should I take to mitigate this vulnerability?

Upgrade LibreChat to version 0.8.1 or later, as this version contains the fix for the vulnerability related to insufficient validation of JSON requests in the PATCH endpoint for prompt groups.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart