HomeLibrechatCVE-2025-7104

CVE-2025-7104

HIGH
7.5CVSS
Published: 2025-09-29
Updated: 2025-10-16
AI Analysis

Description

A mass assignment vulnerability exists in danny-avila/librechat, affecting all versions. This vulnerability allows attackers to manipulate sensitive fields by automatically binding user-provided data to internal object properties or database fields without proper filtering. As a result, any extra fields in the request body are included in agentData and passed to the database layer, allowing overwriting of any field in the schema, such as author, access_level, isCollaborative, and projectIds. Additionally, the Object.Prototype can be polluted due to the use of Object.assign with spread operators.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-915

Metadata

Primary Vendor
LIBRECHAT
Published
9/29/2025
Last Modified
10/16/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

librechat : librechat

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-7104 | HIGH Severity | CVEDatabase.com | CVEDatabase.com