{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T15:08:25.358","vulnerabilities":[{"cve":{"id":"CVE-2026-31949","sourceIdentifier":"security-advisories@github.com","published":"2026-03-13T19:54:39.753","lastModified":"2026-03-17T12:26:45.177","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"LibreChat is a ChatGPT clone with additional features. Prior to 0.8.3-rc1, a Denial of Service (DoS) vulnerability exists in the DELETE /api/convos endpoint that allows an authenticated attacker to crash the Node.js server process by sending malformed requests. The DELETE /api/convos route handler attempts to destructure req.body.arg without validating that it exists. The server crashes due to an unhandled TypeError that bypasses Express error handling middleware and triggers process.exit(1). This vulnerability is fixed in 0.8.3-rc1."},{"lang":"es","value":"LibreChat es un clon de ChatGPT con características adicionales. Antes de la versión 0.8.3-rc1, existe una vulnerabilidad de denegación de servicio (DoS) en el endpoint DELETE /api/convos que permite a un atacante autenticado bloquear el proceso del servidor Node.js enviando solicitudes malformadas. El gestor de ruta DELETE /api/convos intenta desestructurar req.body.arg sin validar que exista. El servidor se bloquea debido a un TypeError no manejado que omite el middleware de manejo de errores de Express y activa process.exit(1). Esta vulnerabilidad está corregida en la versión 0.8.3-rc1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-248"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*","versionEndExcluding":"0.8.3","matchCriteriaId":"2D34833A-E49E-47F0-8C2E-0D55B6CF59BB"}]}]}],"references":[{"url":"https://github.com/danny-avila/LibreChat/security/advisories/GHSA-5m32-chq6-232p","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory","Exploit"]}]}}]}