CVE-2024-32965

Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be modified to scan an internal network in the target lobe-web environment. This issue has been addressed in release version 1.19.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*

History

23 Sep 2025, 14:16

Type Values Removed Values Added
First Time Lobehub lobe Chat
Lobehub
References () https://github.com/lobehub/lobe-chat/commit/e960a23b0c69a5762eb27d776d33dac443058faf - () https://github.com/lobehub/lobe-chat/commit/e960a23b0c69a5762eb27d776d33dac443058faf - Patch
References () https://github.com/lobehub/lobe-chat/security/advisories/GHSA-2xcc-vm3f-m8rw - () https://github.com/lobehub/lobe-chat/security/advisories/GHSA-2xcc-vm3f-m8rw - Exploit, Vendor Advisory
CPE cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*

Information

Published : 2024-11-26 19:15

Updated : 2025-09-23 14:16


NVD link : CVE-2024-32965

Mitre link : CVE-2024-32965

CVE.ORG link : CVE-2024-32965


JSON object : View

Products Affected

lobehub

  • lobe_chat
CWE
CWE-918

Server-Side Request Forgery (SSRF)