CVE-2026-22252

LibreChat · LibreChat is a ChatGPT clone with additional Multiple Products

A critical vulnerability has been discovered in the LibreChat application, which allows any authenticated user to take complete control of the application's underlying container.

Executive summary

A critical vulnerability has been discovered in the LibreChat application, which allows any authenticated user to take complete control of the application's underlying container. This flaw enables an attacker to execute arbitrary commands with the highest privileges (root), potentially leading to data theft, complete service disruption, and further unauthorized access into the corporate network. Immediate patching is required to mitigate this high-risk vulnerability.

Vulnerability

The vulnerability exists within the MCP (Multi-Container Platform) stdio transport component of LibreChat. This component fails to properly validate or sanitize user-supplied input. An authenticated attacker can craft a malicious API request containing arbitrary shell commands, which are then passed directly to the system's shell and executed with root privileges inside the application container.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.1. Successful exploitation grants an attacker full administrative control (root access) over the LibreChat container. This could lead to severe consequences, including the exfiltration of sensitive data such as conversation logs, user credentials, and API keys stored within the environment. An attacker could also disrupt or completely disable the service, pivot to attack other internal network resources, or use the compromised system for malicious activities like hosting malware or launching further attacks, posing a significant risk to data confidentiality, integrity, and availability.

Remediation

Immediate Action: Immediately upgrade all instances of LibreChat to version v0.8.2-rc2 or a later version, which contains the fix for this vulnerability. After patching, review API and system logs for any signs of compromise, such as unusual commands or outbound connections, that may have occurred prior to the update.

Proactive Monitoring: Implement continuous monitoring of LibreChat application and container logs. Specifically, look for suspicious API requests containing shell command syntax (e.g., ls, cat, curl, ;, &&). Monitor for unexpected processes running within the container and unusual outbound network traffic, which could indicate a successful breach.

Compensating Controls: If immediate patching is not feasible, consider implementing the following controls:

  • Place a Web Application Firewall (WAF) in front of the LibreChat instance with rules designed to detect and block common command injection patterns.
  • Apply strict network egress filtering on the container to prevent it from communicating with unauthorized external or internal systems.
  • Enhance authentication and access controls, ensuring that only highly trusted users have access to the application to reduce the attack surface.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.1 and the potential for complete system compromise, it is imperative that organizations using the affected versions of LibreChat treat this vulnerability with the highest priority. The recommended course of action is to apply the security patch and upgrade to version v0.8.2-rc2 or later immediately. Do not wait for public exploitation to be reported; the risk of data breach and further network intrusion is severe.