{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T21:36:49.508","vulnerabilities":[{"cve":{"id":"CVE-2024-32965","sourceIdentifier":"security-advisories@github.com","published":"2024-11-26T19:15:23.343","lastModified":"2025-09-23T14:16:58.173","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be modified to scan an internal network in the target lobe-web environment. This issue has been addressed in release version 1.19.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Lobe Chat es un framework de chat de inteligencia artificial de código abierto. Las versiones de lobe-chat anteriores a la 1.19.13 tienen una vulnerabilidad SSRF no autorizada. Un atacante puede crear solicitudes maliciosas para provocar SSRF sin iniciar sesión, atacar servicios de intranet y filtrar información confidencial. La dirección del proxy almacenada del encabezado del token jwt X-Lobe-Chat-Auth y la clave de API de OpenAI se pueden modificar para escanear una red interna en el entorno web de lobe-web de destino. Este problema se ha solucionado en la versión de lanzamiento 1.19.13 y se recomienda a todos los usuarios que la actualicen. No existen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":5.3},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":4.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*","versionEndExcluding":"1.19.13","matchCriteriaId":"41FC0CCA-D248-4589-9B6E-810A73D7CC9D"}]}]}],"references":[{"url":"https://github.com/lobehub/lobe-chat/commit/e960a23b0c69a5762eb27d776d33dac443058faf","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/lobehub/lobe-chat/security/advisories/GHSA-2xcc-vm3f-m8rw","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}