CVE-2024-11171

In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit on the upload file size. This can lead to a server crash due to out-of-memory errors when handling large files. An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. The issue is fixed in version 0.7.6.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*

History

15 Jul 2025, 16:44

Type Values Removed Values Added
First Time Librechat
Librechat librechat
CPE cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*
References () https://github.com/danny-avila/librechat/commit/bb58a2d0662ef86dc75a9d2f6560125c018e3836 - () https://github.com/danny-avila/librechat/commit/bb58a2d0662ef86dc75a9d2f6560125c018e3836 - Patch
References () https://huntr.com/bounties/91717a5a-d653-4e35-b186-9e8d00aa4285 - () https://huntr.com/bounties/91717a5a-d653-4e35-b186-9e8d00aa4285 - Exploit, Third Party Advisory

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-15 16:44


NVD link : CVE-2024-11171

Mitre link : CVE-2024-11171


JSON object : View

Products Affected

librechat

  • librechat
CWE
CWE-20

Improper Input Validation