CVE-2025-69220

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to modify the behavior of arbitrary LibreChat agents by uploading files to file contexts or file searches without proper permissions. Attackers can alter agent functionality even when they shouldn't have access to those agents. This affects all LibreChat deployments running version 0.8.1-rc2.

💻 Affected Systems

Products:
  • LibreChat
Versions: Version 0.8.1-rc2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the vulnerable version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could upload malicious files that alter agent behavior to execute arbitrary code, steal sensitive data, or disrupt agent operations across the entire LibreChat deployment.

🟠

Likely Case

Attackers modify agent behavior to perform unauthorized actions, potentially leading to data leakage, service disruption, or privilege escalation within the LibreChat environment.

🟢

If Mitigated

With proper access controls, only authorized users can modify agent files, limiting impact to authorized changes within intended agent functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of agent IDs, but the vulnerability itself is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.8.2-rc2

Vendor Advisory: https://github.com/danny-avila/LibreChat/security/advisories/GHSA-xcmf-rpmh-hg59

Restart Required: Yes

Instructions:

1. Backup your current LibreChat installation and data. 2. Update to version 0.8.2-rc2 using git pull or downloading the release. 3. Restart the LibreChat service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict agent ID access

all

Implement additional access controls to limit which users can obtain or use agent IDs

Disable file upload functionality

all

Temporarily disable file uploads to agent contexts and searches until patched

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate LibreChat instances
  • Enforce strong authentication and monitor for unusual file upload patterns

🔍 How to Verify

Check if Vulnerable:

Check if LibreChat version is 0.8.1-rc2 by examining the version in the application interface or configuration files

Check Version:

Check the application interface or configuration files for version information

Verify Fix Applied:

Verify the version has been updated to 0.8.2-rc2 and test that authenticated users without agent permissions cannot upload files to agent contexts

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file upload attempts to agent contexts
  • Multiple failed permission checks for agent file operations
  • File uploads from users not associated with specific agents

Network Indicators:

  • Unusual file upload patterns to agent endpoints
  • Multiple file upload requests to different agent IDs from single user

SIEM Query:

source="librechat" AND (event="file_upload" OR event="permission_denied") AND (agent_id NOT IN authorized_agents)

🔗 References

📤 Share & Export