Skip to content
Threat Feed
high advisory

LibreChat SSRF Vulnerability (CVE-2026-31943)

LibreChat versions prior to 0.8.3 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated users to bypass IP address validation and make the server issue HTTP requests to internal network resources.

LibreChat, a ChatGPT clone, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-31943) in versions prior to 0.8.3. The isPrivateIP() function in packages/api/src/auth/domain.ts fails to properly detect IPv4-mapped IPv6 addresses when they are in their hex-normalized form. This flaw allows an authenticated user to bypass SSRF protection mechanisms and force the LibreChat server to make HTTP requests to internal network resources. These resources include cloud metadata…

Detection coverage 2

LibreChat SSRF Attempt via IPv6

high

Detects potential SSRF attempts in LibreChat by identifying HTTP requests containing IPv4-mapped IPv6 addresses.

sigma tactics: initial_access techniques: T1190 sources: webserver, linux

LibreChat SSRF Attempt via Private IP Address

medium

Detects potential SSRF attempts in LibreChat by identifying HTTP requests containing private IP addresses (RFC1918).

sigma tactics: initial_access techniques: T1190 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

1

ip