Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 15 Dec 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 12 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librechat
Librechat librechat |
|
| Vendors & Products |
Librechat
Librechat librechat |
Thu, 11 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication. | |
| Title | LibreChat's lack of JSON parsing error handling can lead to XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-12T19:28:19.177Z
Reserved: 2025-12-01T18:44:35.639Z
Link: CVE-2025-66452
Updated: 2025-12-12T19:28:16.184Z
Status : Analyzed
Published: 2025-12-11T23:15:50.880
Modified: 2025-12-15T17:35:25.370
Link: CVE-2025-66452
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:48:42Z