Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librechat
Librechat librechat |
|
| CPEs | cpe:2.3:a:librechat:librechat:0.8.2:-:*:*:*:*:*:* cpe:2.3:a:librechat:librechat:0.8.2:rc2:*:*:*:*:*:* cpe:2.3:a:librechat:librechat:0.8.2:rc3:*:*:*:*:*:* |
|
| Vendors & Products |
Librechat
Librechat librechat |
Mon, 30 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Danny-avila
Danny-avila libre Chat |
|
| Vendors & Products |
Danny-avila
Danny-avila libre Chat |
Fri, 27 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 through 0.8.2 are vulnerable to a server-side request forgery (SSRF) attack when using agent actions or MCP. Although a previous SSRF vulnerability (https://github.com/danny-avila/LibreChat/security/advisories/GHSA-rgjq-4q58-m3q8) was reported and patched, the fix only introduced hostname validation. It does not verify whether DNS resolution results in a private IP address. As a result, an attacker can still bypass the protection and gain access to internal resources, such as an internal RAG API or cloud instance metadata endpoints. Version 0.8.3-rc1 contains a patch. | |
| Title | LibreChat Server-Side Request Forgery using DNS resolution | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-30T19:00:53.475Z
Reserved: 2026-03-10T15:10:10.656Z
Link: CVE-2026-31945
Updated: 2026-03-30T19:00:41.187Z
Status : Analyzed
Published: 2026-03-27T20:16:30.060
Modified: 2026-03-30T20:35:03.990
Link: CVE-2026-31945
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:00:51Z