Complete Guide to CVE-2025-69222 - LibreChat is vulnerable to Server-Side Request Forgery due to missing restrictions

Complete Guide to CVE-2025-69222 - LibreChat is vulnerable to Server-Side Request Forgery due to missing restrictions

CVE ID : CVE-2025-69222 Published : Jan. 7, 2026, 9:17 p.m. | 1 hour, 12 minutes ago Description : LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 is prone to a server-side request forgery (SSRF) vulnerability due to missing restrictions of the Actions feature in the default configuration. LibreChat enables users to configure agents with predefined instructions and actions that can interact with remote services via OpenAPI specifications, supporting various HTTP methods, parameters, and authentication methods including custom headers. By default, there are no restrictions on accessible services, which means agents can also access internal components like the RAG API included in the default Docker Compose setup. This issue is fixed in version 0.8.1-rc2. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Published
Jan. 7, 2026
Affected Product: Docker
Impact: SSRF

Source: Telegram CVE Monitor