Lobe Chat is an open-source LLMs/AI chat framework. In affected versions if an attacker can successfully authenticate through SSO/Access Code, they can obtain the real backend API Key by modifying the base URL to their own attack URL on the frontend and setting up a server-side request. This issue has been addressed in version 0.162.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v | Vendor Advisory Exploit |
| https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v | Vendor Advisory Exploit |
Configurations
History
08 Oct 2025, 16:08
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Lobehub lobe Chat
Lobehub |
|
| References | () https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v - Vendor Advisory, Exploit | |
| CPE | cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:* |
Information
Published : 2024-06-17 20:15
Updated : 2025-10-08 16:08
NVD link : CVE-2024-37895
Mitre link : CVE-2024-37895
CVE.ORG link : CVE-2024-37895
JSON object : View
Products Affected
lobehub
- lobe_chat
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
