In danny-avila/librechat version v0.7.5-rc2, a vulnerability exists in the preset creation functionality where a user can manipulate the user ID field through mass assignment. This allows an attacker to inject a different user ID into the preset object, causing the preset to appear in the UI of another user. The vulnerability arises because the backend saves the entire object received without validating the attributes and their values, impacting both integrity and confidentiality.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/danny-avila/librechat/commit/e3e52402f69accc35c6d0acd9c3266ae1cb6333f | Patch |
https://huntr.com/bounties/bba65eb4-4c83-4f33-83c1-ede5ed0d5656 | Exploit Third Party Advisory |
Configurations
History
11 Jul 2025, 20:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:librechat:librechat:0.7.5:rc2:*:*:*:*:*:* | |
First Time |
Librechat
Librechat librechat |
|
References | () https://huntr.com/bounties/bba65eb4-4c83-4f33-83c1-ede5ed0d5656 - Exploit, Third Party Advisory | |
References | () https://github.com/danny-avila/librechat/commit/e3e52402f69accc35c6d0acd9c3266ae1cb6333f - Patch |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-11 20:32
NVD link : CVE-2024-10359
Mitre link : CVE-2024-10359
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-915
Improperly Controlled Modification of Dynamically-Determined Object Attributes