


Perceptive Security
SOC/SIEM Consultancy

LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allow…
Published:
11 January 2026 at 23:00:00
Alert date:
12 January 2026 at 21:02:40
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
LibreChat, a ChatGPT clone application, contains a critical vulnerability in versions prior to v0.8.2-rc2. The vulnerability exists in the MCP stdio transport component which accepts arbitrary commands without proper validation. Any authenticated user can exploit this flaw to execute shell commands with root privileges inside the container through a single API request. This represents a severe privilege escalation vulnerability that allows complete compromise of the containerized application. The issue has been patched in version v0.8.2-rc2.
Technical details
Mitigation steps:
Affected products:
LibreChat
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-22252
https://github.com/danny-avila/LibreChat/commit/211b39f3113d4e6ecab84be0a83f4e9c9dea127f
https://github.com/danny-avila/LibreChat/security/advisories/GHSA-cxhj-j78r-p88f
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
