SBA Security Advisory – LibreChat Server-Side Request Forgery (CVE-2025-69222)
Vulnerability Overview
LibreChat version 0.8.1-rc2 is prone to a server-side request forgery (SSRF) vulnerability due to missing restrictions of the Actions feature in the default configuration. This allows attackers to interact with arbitrary third-party HTTP services, for example the internal RAG API.
- Type of Vulnerability: Server-Side Request Forgery (SSRF)
- Fixed in Version: 0.8.2-rc2
- CVE ID: CVE-2025-69222
- CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
- CVSS Base Score: 9.1 (Critical)
Recommended Countermeasure
We recommend updating to LibreChat version 0.8.2-rc2 or later and set the option actions.allowedDomains to a non-empty list. Moreover, the allowed entries should explicitly specify the protocol and port.
Links
Credits
Lisa Gnedt (SBA Research)
Michael Koppmann (SBA Research)
The discovery of this vulnerability was made possible through support from CYSSDE and the European Union.
