Description
LibreChat version 0.7.9 is vulnerable to a Denial of Service (DoS) attack due to unbounded parameter values in the `/api/memories` endpoint. The `key` and `value` parameters accept arbitrarily large inputs without proper validation, leading to a null pointer error in the Rust-based backend when excessively large values are submitted. This results in the inability to create new memories, impacting the stability of the service.
References (2)
Core 2
Core References
Exploit, Mitigation, Third Party Advisory
https://huntr.com/bounties/e9d9404c-cd19-4226-a580-9cba14b7d7d6
Scores
CVSS v3
7.5
EPSS
0.0009
EPSS Percentile
25.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-400
Status
published
Products (1)
librechat/librechat
0.7.9
Published
Oct 31, 2025
Tracked Since
Feb 18, 2026