CVE-2026-31945

LibreChat · LibreChat

LibreChat, an open-source ChatGPT clone, contains a high-severity vulnerability that could impact the security of the AI interface and user data.

Executive summary

LibreChat is affected by a high-severity security vulnerability that could allow attackers to compromise the application environment or gain unauthorized access to user sessions.

Vulnerability

The vulnerability exists in the LibreChat application, a platform for interfacing with various AI models. With a CVSS score of 7.7, the flaw likely involves improper input validation or a session management issue that could be exploited by an attacker to intercept data or perform actions on behalf of users.

Business impact

Exploitation of this vulnerability could lead to the exposure of sensitive AI prompts, API keys, and private conversations. In a corporate environment, this represents a significant data leak risk. The High severity rating (7.7) reflects the potential for attackers to disrupt the service or compromise the privacy of all users on the platform.

Remediation

Immediate Action: Administrators of LibreChat instances should pull the latest Docker images or update the source code to the most recent patched version immediately.

Proactive Monitoring: Review application logs for suspicious API calls or unauthorized attempts to access the administrative dashboard.

Compensating Controls: Implement a reverse proxy with strong authentication (e.g., OAuth or SAML) to protect the LibreChat interface from direct public exposure.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the increasing use of AI clones in business workflows, this vulnerability should be treated with high priority. Administrators must ensure their LibreChat deployments are updated to the latest version to protect user data and maintain the integrity of the AI environment.