Open Redirect Affecting @lobehub/chat package, versions <1.130.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-LOBEHUBCHAT-13110084
  • published29 Sept 2025
  • disclosed25 Sept 2025
  • creditKim SooHyun im-soohyun

Introduced: 25 Sep 2025

CVE-2025-59426  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade @lobehub/chat to version 1.130.1 or higher.

Overview

@lobehub/chat is a Lobe Chat - an open-source, high-performance chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Supports one-click free deployment of your private ChatGPT/LLM web application.

Affected versions of this package are vulnerable to Open Redirect via the OIDC redirect handling process. An attacker can cause users to be redirected to arbitrary domains by injecting malicious values into the X-Forwarded-Host or X-Forwarded-Proto headers. This is only exploitable if the deployment's reverse proxy forwards client-supplied X-Forwarded-* headers to the origin as-is, or if the origin trusts these headers without validation.

PoC


curl -i 'http://localhost:3210/oidc/callback/desktop?code=abc&state=test123' \
  -H 'X-Forwarded-Host: google.com' \
  -H 'X-Forwarded-Proto: https'

CVSS Base Scores

version 4.0
version 3.1