A mass assignment vulnerability exists in danny-avila/librechat, affecting all versions. This vulnerability allows attackers to manipulate sensitive fields by automatically binding user-provided data to internal object properties or database fields without proper filtering. As a result, any extra fields in the request body are included in agentData and passed to the database layer, allowing overwriting of any field in the schema, such as author, access_level, isCollaborative, and projectIds. Additionally, the Object.Prototype can be polluted due to the use of Object.assign with spread operators.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/librechat/commit/a37bf6719cfbc2de270f7d87b6b85d87cc1768db | Patch |
| https://huntr.com/bounties/32a175c4-7543-4503-a3d0-7880abd1826b | Exploit Patch Third Party Advisory |
Configurations
History
16 Oct 2025, 16:45
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:* | |
| First Time |
Librechat
Librechat librechat |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/danny-avila/librechat/commit/a37bf6719cfbc2de270f7d87b6b85d87cc1768db - Patch | |
| References | () https://huntr.com/bounties/32a175c4-7543-4503-a3d0-7880abd1826b - Exploit, Patch, Third Party Advisory |
29 Sep 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-29 17:15
Updated : 2025-10-16 16:45
NVD link : CVE-2025-7104
Mitre link : CVE-2025-7104
CVE.ORG link : CVE-2025-7104
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-915
Improperly Controlled Modification of Dynamically-Determined Object Attributes
