HomeLibrechatCVE-2024-11171

CVE-2024-11171

HIGH
7.5CVSS
Published: 2025-03-20
Updated: 2025-10-15
AI Analysis

Description

In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit on the upload file size. This can lead to a server crash due to out-of-memory errors when handling large files. An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. The issue is fixed in version 0.7.6.

CVSS Metrics

Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-770

Metadata

Primary Vendor
LIBRECHAT
Published
3/20/2025
Last Modified
10/15/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

librechat : librechat

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-11171 | HIGH Severity | CVEDatabase.com | CVEDatabase.com