A vulnerability in danny-avila/librechat version 0.7.9 allows for HTML injection via the Accept-Language header. When a logged-in user sends an HTTP GET request with a crafted Accept-Language header, arbitrary HTML can be injected into the <html lang=""> tag of the response. This can lead to potential security risks such as cross-site scripting (XSS) attacks.
References
| Link | Resource |
|---|---|
| https://huntr.com/bounties/a05ebc1f-882a-4adc-b178-d3cefa4b730e | Exploit Third Party Advisory |
Configurations
History
30 Oct 2025, 17:34
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| References | () https://huntr.com/bounties/a05ebc1f-882a-4adc-b178-d3cefa4b730e - Exploit, Third Party Advisory | |
| First Time |
Librechat librechat
Librechat |
|
| CWE | CWE-79 | |
| CPE | cpe:2.3:a:librechat:librechat:0.7.9:-:*:*:*:*:*:* |
22 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-22 14:15
Updated : 2025-10-30 17:34
NVD link : CVE-2025-8848
Mitre link : CVE-2025-8848
CVE.ORG link : CVE-2025-8848
JSON object : View
Products Affected
librechat
- librechat
