CVE-2024-10361
Published: 20 March 2025
Summary
CVE-2024-10361 is a critical-severity Path Traversal (CWE-22) vulnerability in Librechat Librechat. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Enterprise AI Assistants; in the Other ATLAS/OWASP Terms risk domain.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the improper input validation in the /api/files endpoint that allows path traversal for arbitrary file deletion.
Requires timely flaw remediation through patching LibreChat beyond v0.7.5-rc2 to fix the path traversal vulnerability.
Enforces logical access controls to restrict file deletion operations to authorized paths and resources, mitigating unauthorized deletions via traversal.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The path traversal vulnerability in the public-facing /api/files endpoint of LibreChat enables exploitation of a public-facing application (T1190) and facilitates arbitrary file deletion for indicator removal and defense evasion (T1070.004).
NVD Description
An arbitrary file deletion vulnerability exists in danny-avila/librechat version v0.7.5-rc2, specifically within the /api/files endpoint. This vulnerability arises from improper input validation, allowing path traversal techniques to delete arbitrary files on the server. Attackers can exploit this to bypass security…
more
mechanisms and delete files outside the intended directory, including critical system files, user data, or application resources. This vulnerability impacts the integrity and availability of the system.
Deeper analysisAI
CVE-2024-10361 is an arbitrary file deletion vulnerability in danny-avila/librechat version v0.7.5-rc2, affecting the /api/files endpoint due to improper input validation. This flaw enables path traversal attacks (CWE-22), allowing attackers to delete files outside the intended directory. The vulnerability carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), highlighting its critical severity with high impacts on integrity and availability but no confidentiality loss.
Remote attackers require no privileges or user interaction to exploit this over the network with low complexity. Successful exploitation lets them bypass security controls to delete arbitrary files, such as critical system files, user data, or application resources, potentially disrupting system integrity and availability.
Mitigation details are provided in the referenced GitHub commit (https://github.com/danny-avila/librechat/commit/0b744db1e2af31a531ffb761584d85540430639c), which addresses the issue, and the Huntr advisory (https://huntr.com/bounties/e811f7f7-9556-4564-82e2-5b3d17599b2d). Security practitioners should update to a patched version of LibreChat beyond v0.7.5-rc2 and validate inputs to prevent path traversal in file-handling endpoints.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Enterprise AI Assistants
- Risk Domain
- Other ATLAS/OWASP Terms
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- LibreChat is an open-source AI chat platform (self-hosted ChatGPT alternative) supporting multiple LLMs like OpenAI and Ollama, fitting the Enterprise AI Assistants category. The vulnerability is in its /api/files endpoint, confirmed AI-related via AI/ML bug bounty platform (huntr.com).