{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T03:14:55.363","vulnerabilities":[{"cve":{"id":"CVE-2024-11170","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:24.323","lastModified":"2025-07-15T16:45:15.543","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in danny-avila/librechat version git 81f2936 allows for path traversal due to improper sanitization of file paths by the multer middleware. This can lead to arbitrary file write and potentially remote code execution. The issue is fixed in version 0.7.6."},{"lang":"es","value":"Una vulnerabilidad en la versión git 81f2936 de danny-avila/librechat permite el path traversal debido a la depuración incorrecta de las rutas de archivo por parte del middleware multer. Esto puede provocar escrituras arbitrarias en archivos y, potencialmente, la ejecución remota de código. El problema se solucionó en la versión 0.7.6."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-29"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*","versionEndExcluding":"0.7.6","matchCriteriaId":"E179B3DF-58FF-4973-9462-0DACCC77DC7A"}]}]}],"references":[{"url":"https://github.com/danny-avila/librechat/commit/629be5c0ca2b332178524b4e3f6fac715aea8cc4","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/b64156c2-5380-4d4d-af30-b2938dcdd46e","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}