SB2026031701 - Two path traversal vulnerabilities in LibreChat RAG API
Published: March 17, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2025-68413)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in /embed-local, /embed, and /embed-upload endpoints. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.
2) Path traversal (CVE-ID: CVE-2025-68414)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in /embed-local, /embed, and /embed-upload endpoints. A remote user can send a specially crafted HTTP request and delete arbitrary files on the system.
Remediation
Install update from vendor's website.
References
- https://github.com/danny-avila/rag_api/pull/227
- https://github.com/danny-avila/rag_api/pull/227/changes/d50f95852683ad3cdf1c7fdc3c3ea0695966ea13
- https://github.com/danny-avila/rag_api/pull/227/changes/8a3743ec4a2c7bf66510ab948e3d0f5efcb0e799
- https://github.com/danny-avila/rag_api/pull/227/changes/41c6df91f5f3dc84ab90295fbc4663270755c8c0