{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-7106","assignerOrgId":"c09c270a-b464-47c1-9133-acb35b22c19a","state":"PUBLISHED","assignerShortName":"@huntr_ai","dateReserved":"2025-07-05T19:01:51.636Z","datePublished":"2025-09-23T09:54:33.716Z","dateUpdated":"2025-09-23T19:29:47.785Z"},"containers":{"cna":{"title":"Authorization Bypass due to Incorrect Access Control in danny-avila/librechat","providerMetadata":{"orgId":"c09c270a-b464-47c1-9133-acb35b22c19a","shortName":"@huntr_ai","dateUpdated":"2025-09-23T09:54:33.716Z"},"descriptions":[{"lang":"en","value":"danny-avila/librechat is affected by an authorization bypass vulnerability due to improper access control checks. The `checkAccess` function in `api/server/middleware/roles/access.js` uses `permissions.some()` to validate permissions, which incorrectly grants access if only one of multiple required permissions is present. This allows users with the 'USER' role to create agents despite having `CREATE: false` permission, as the check for `['USE', 'CREATE']` passes with just `USE: true`. This vulnerability affects other permission checks as well, such as `PROMPTS`. The issue is present in all versions prior to the fix."}],"affected":[{"vendor":"danny-avila","product":"danny-avila/librechat","versions":[{"version":"unspecified","lessThan":"v0.7.9","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://huntr.com/bounties/7de2765b-d1fe-4495-9144-220070857c48"},{"url":"https://github.com/danny-avila/librechat/commit/91a2df47599c09d80886bfc28e0ccf1debd42110"}],"metrics":[{"cvssV3_0":{"version":"3.0","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-284 Improper Access Control","cweId":"CWE-284"}]}],"source":{"advisory":"7de2765b-d1fe-4495-9144-220070857c48","discovery":"EXTERNAL"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-23T19:29:40.670533Z","id":"CVE-2025-7106","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-23T19:29:47.785Z"}}]}}