LibreChat SSRF Vulnerability (CVE-2026-31943)
LibreChat versions prior to 0.8.3 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated users to bypass IP address validation and make the server issue HTTP requests to internal network resources.
LibreChat, a ChatGPT clone, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-31943) in versions prior to 0.8.3. The isPrivateIP() function in packages/api/src/auth/domain.ts fails to properly detect IPv4-mapped IPv6 addresses when they are in their hex-normalized form. This flaw allows an authenticated user to bypass SSRF protection mechanisms and force the LibreChat server to make HTTP requests to internal network resources. These resources include cloud metadata…
Detection coverage 2
LibreChat SSRF Attempt via IPv6
highDetects potential SSRF attempts in LibreChat by identifying HTTP requests containing IPv4-mapped IPv6 addresses.
LibreChat SSRF Attempt via Private IP Address
mediumDetects potential SSRF attempts in LibreChat by identifying HTTP requests containing private IP addresses (RFC1918).
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
ip