Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 10 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:librechat:librechat:0.7.9:-:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 31 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librechat
Librechat librechat |
|
| Vendors & Products |
Librechat
Librechat librechat |
Fri, 31 Oct 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreChat version 0.7.9 is vulnerable to a Denial of Service (DoS) attack due to unbounded parameter values in the `/api/memories` endpoint. The `key` and `value` parameters accept arbitrarily large inputs without proper validation, leading to a null pointer error in the Rust-based backend when excessively large values are submitted. This results in the inability to create new memories, impacting the stability of the service. | |
| Title | Denial of Service in danny-avila/librechat | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-10-31T15:09:34.057Z
Reserved: 2025-08-10T18:16:35.321Z
Link: CVE-2025-8849
Updated: 2025-10-31T15:00:02.570Z
Status : Analyzed
Published: 2025-10-31T00:15:37.480
Modified: 2025-11-10T17:14:43.587
Link: CVE-2025-8849
No data.
OpenCVE Enrichment
Updated: 2025-10-31T10:12:50Z