LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allowing any authenticated user to execute shell commands as root inside the container through a single API request. This vulnerability is fixed in v0.8.2-rc2.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/LibreChat/commit/211b39f3113d4e6ecab84be0a83f4e9c9dea127f | Patch |
| https://github.com/danny-avila/LibreChat/security/advisories/GHSA-cxhj-j78r-p88f | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-12 19:16
Updated : 2026-01-15 22:46
NVD link : CVE-2026-22252
Mitre link : CVE-2026-22252
CVE.ORG link : CVE-2026-22252
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-285
Improper Authorization
