๐Ÿ” CVE Alert

CVE-2026-34371

MEDIUM 6.3

LibreChat Affected by Arbitrary File Write via `execute_code` Artifact Filename Traversal

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
11th

LibreChat is a ChatGPT clone with additional features. Prior to 0.8.4, LibreChat trusts the name field returned by the execute_code sandbox when persisting code-generated artifacts. On deployments using the default local file strategy, a malicious artifact filename containing traversal sequences (for example, ../../../../../app/client/dist/poc.txt) is concatenated into the server-side destination path and written with fs.writeFileSync() without sanitization. This gives any user who can trigger execute_code an arbitrary file write primitive as the LibreChat server user. This vulnerability is fixed in 0.8.4.

CWE CWE-22
Vendor danny-avila
Product librechat
Published Apr 7, 2026
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for danny-avila librechat

Be the first to know when new medium vulnerabilities affecting danny-avila librechat are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

danny-avila / LibreChat
< 0.8.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/danny-avila/LibreChat/security/advisories/GHSA-qrm5-r67f-6692