@lobehub/chat@0.82.1 vulnerabilities

Lobe Chat - an open-source, high-performance chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Supports one-click free deployment of your private ChatGPT/LLM web application.

Direct Vulnerabilities

Known vulnerabilities in the @lobehub/chat package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Server-side Request Forgery (SSRF)

@lobehub/chat is a Lobe Chat - an open-source, high-performance chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Supports one-click free deployment of your private ChatGPT/LLM web application.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the /api/proxy endpoint, without logging in.

How to fix Server-side Request Forgery (SSRF)?

Upgrade @lobehub/chat to version 0.150.6 or higher.

<0.150.6
  • M
Server-side Request Forgery (SSRF)

@lobehub/chat is a Lobe Chat - an open-source, high-performance chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Supports one-click free deployment of your private ChatGPT/LLM web application.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the base URL configuration, which can expose the backend API key to an attacker-controlled domain as outbound traffic is not filtered on URL. The API key can subsequently be used for unauthorized access to the vulnerable server.

How to fix Server-side Request Forgery (SSRF)?

Upgrade @lobehub/chat to version 0.162.25 or higher.

<0.162.25
  • M
Improper Access Control

@lobehub/chat is a Lobe Chat - an open-source, high-performance chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Supports one-click free deployment of your private ChatGPT/LLM web application.

Affected versions of this package are vulnerable to Improper Access Control via the ACCESS_CODE option. An attacker can access plugins without proper authorization by bypassing the password protection mechanism.

Note:

This is only exploitable if the application is deployed with the ACCESS_CODE option.

How to fix Improper Access Control?

Upgrade @lobehub/chat to version 0.122.4 or higher.

<0.122.4