Cyber Posture

CVE-2024-10361

CriticalPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
15 October 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0007 21.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-10361 is a critical-severity Path Traversal (CWE-22) vulnerability in Librechat Librechat. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Enterprise AI Assistants; in the Other ATLAS/OWASP Terms risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper input validation in the /api/files endpoint that allows path traversal for arbitrary file deletion.

prevent

Requires timely flaw remediation through patching LibreChat beyond v0.7.5-rc2 to fix the path traversal vulnerability.

prevent

Enforces logical access controls to restrict file deletion operations to authorized paths and resources, mitigating unauthorized deletions via traversal.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

The path traversal vulnerability in the public-facing /api/files endpoint of LibreChat enables exploitation of a public-facing application (T1190) and facilitates arbitrary file deletion for indicator removal and defense evasion (T1070.004).

NVD Description

An arbitrary file deletion vulnerability exists in danny-avila/librechat version v0.7.5-rc2, specifically within the /api/files endpoint. This vulnerability arises from improper input validation, allowing path traversal techniques to delete arbitrary files on the server. Attackers can exploit this to bypass security…

more

mechanisms and delete files outside the intended directory, including critical system files, user data, or application resources. This vulnerability impacts the integrity and availability of the system.

Deeper analysisAI

CVE-2024-10361 is an arbitrary file deletion vulnerability in danny-avila/librechat version v0.7.5-rc2, affecting the /api/files endpoint due to improper input validation. This flaw enables path traversal attacks (CWE-22), allowing attackers to delete files outside the intended directory. The vulnerability carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), highlighting its critical severity with high impacts on integrity and availability but no confidentiality loss.

Remote attackers require no privileges or user interaction to exploit this over the network with low complexity. Successful exploitation lets them bypass security controls to delete arbitrary files, such as critical system files, user data, or application resources, potentially disrupting system integrity and availability.

Mitigation details are provided in the referenced GitHub commit (https://github.com/danny-avila/librechat/commit/0b744db1e2af31a531ffb761584d85540430639c), which addresses the issue, and the Huntr advisory (https://huntr.com/bounties/e811f7f7-9556-4564-82e2-5b3d17599b2d). Security practitioners should update to a patched version of LibreChat beyond v0.7.5-rc2 and validate inputs to prevent path traversal in file-handling endpoints.

Details

CWE(s)

Affected Products

librechat
librechat
0.7.5

AI Security AnalysisAI

AI Category
Enterprise AI Assistants
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
LibreChat is an open-source AI chat platform (self-hosted ChatGPT alternative) supporting multiple LLMs like OpenAI and Ollama, fitting the Enterprise AI Assistants category. The vulnerability is in its /api/files endpoint, confirmed AI-related via AI/ML bug bounty platform (huntr.com).

CVEs Like This One

CVE-2025-69222Same product: Librechat Librechat
CVE-2025-41258Same product: Librechat Librechat
CVE-2025-69220Same product: Librechat Librechat
CVE-2026-22252Same product: Librechat Librechat
CVE-2026-31945Same product: Librechat Librechat
CVE-2026-31944Same product: Librechat Librechat
CVE-2026-31943Same product: Librechat Librechat
CVE-2026-33265Same product: Librechat Librechat
CVE-2025-2328Shared CWE-22
CVE-2025-66251Shared CWE-22

References