Ad

CVE-2026-31945

HIGH CVSS 3.1: 7.7 EPSS 0.03%
Updated Mar 30, 2026
GitHub
Parameter Value
CVSS 7.7 (HIGH)
Type CWE-918 (Server-Side Request Forgery (SSRF))
Vendor GitHub
Public PoC No

LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 through 0.8.2 are vulnerable to a server-side request forgery (SSRF) attack when using agent actions or MCP. Although a previous SSRF vulnerability (https://github.com/danny-avila/LibreChat/security/advisories/GHSA-rgjq-4q58-m3q8) was reported and patched, the fix only introduced hostname validation.

It does not verify whether DNS resolution results in a private IP address. As a result, an attacker can still bypass the protection and gain access to internal resources, such as an internal RAG API or cloud instance metadata endpoints. Version 0.8.3-rc1 contains a patch.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 3

Configuration From (including) Up to (excluding)
Librechat Librechat
cpe:2.3:a:librechat:librechat:0.8.2:-:*:*:*:*:*:*
Librechat Librechat
cpe:2.3:a:librechat:librechat:0.8.2:rc2:*:*:*:*:*:*
Librechat Librechat
cpe:2.3:a:librechat:librechat:0.8.2:rc3:*:*:*:*:*:*