Server-Side Request Forgery Vulnerability in LibreChat by Danny Avila
CVE-2026-31945
7.7HIGH
What is CVE-2026-31945?
LibreChat, a ChatGPT clone with unique features, is vulnerable to a server-side request forgery (SSRF) attack in its versions 0.8.2-rc2 and 0.8.2. This vulnerability arises when utilizing agent actions or MCP, allowing attackers to exploit a flaw in the hostname validation process. Although a previous advisory addressed a related SSRF risk, the implemented fix failed to fully validate DNS resolutions against private IP addresses. Consequently, attackers can potentially access sensitive internal resources, including an internal RAG API or cloud instance metadata endpoints. Users are encouraged to update to version 0.8.3-rc1, which includes a critical patch to address this issue.
Affected Version(s)
LibreChat >= 0.8.2-rc2, < 0.8.3-rc1
