In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit on the upload file size. This can lead to a server crash due to out-of-memory errors when handling large files. An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. The issue is fixed in version 0.7.6.
References
Link | Resource |
---|---|
https://github.com/danny-avila/librechat/commit/bb58a2d0662ef86dc75a9d2f6560125c018e3836 | Patch |
https://huntr.com/bounties/91717a5a-d653-4e35-b186-9e8d00aa4285 | Exploit Third Party Advisory |
Configurations
History
15 Jul 2025, 16:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:* | |
First Time |
Librechat
Librechat librechat |
|
References | () https://github.com/danny-avila/librechat/commit/bb58a2d0662ef86dc75a9d2f6560125c018e3836 - Patch | |
References | () https://huntr.com/bounties/91717a5a-d653-4e35-b186-9e8d00aa4285 - Exploit, Third Party Advisory |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-15 16:44
NVD link : CVE-2024-11171
Mitre link : CVE-2024-11171
CVE.ORG link : CVE-2024-11171
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-20
Improper Input Validation