A vulnerability in danny-avila/librechat prior to version 0.7.6 allows for logs debug injection. The parameters sessionId, fileId, userId, and file_id in the /code/download/:sessionId/:fileId and /download/:userId/:file_id APIs are not validated or filtered, leading to potential log injection attacks. This can cause distortion of monitoring and investigation information, evade detection from security systems, and create difficulties in maintenance and operation.
References
Link | Resource |
---|---|
https://github.com/danny-avila/librechat/commit/95d6bd2c2db4a09b308be2b96e3d5fd522c7b72a | Patch |
https://huntr.com/bounties/6e477667-dcd4-42c2-b342-a6ce09ffdeeb | Exploit Third Party Advisory |
Configurations
History
14 Jul 2025, 17:56
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
First Time |
Librechat
Librechat librechat |
|
Summary |
|
|
References | () https://github.com/danny-avila/librechat/commit/95d6bd2c2db4a09b308be2b96e3d5fd522c7b72a - Patch | |
References | () https://huntr.com/bounties/6e477667-dcd4-42c2-b342-a6ce09ffdeeb - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:* |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-14 17:56
NVD link : CVE-2024-12580
Mitre link : CVE-2024-12580
CVE.ORG link : CVE-2024-12580
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-117
Improper Output Neutralization for Logs