SB2026031703 - Log injection in LibreChat RAG API



SB2026031703 - Log injection in LibreChat RAG API

Published: March 17, 2026

Security Bulletin ID SB2026031703
Severity
Medium
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper Output Neutralization for Logs (CVE-ID: CVE-2026-4276)

The vulnerability allows a remote user to manipulate or forge log entries.

The vulnerability exists due to improper input validation in the log generation mechanism when processing user-supplied input in POST requests. A remote authenticated user can send a specially crafted request containing CRLF sequences in the file_id parameter to inject arbitrary log entries.

This vulnerability compromises the integrity of audit logs, potentially enabling obfuscation of malicious activity or downstream attacks such as cross-site scripting (XSS) if logs are displayed in a web-based console without proper sanitization. 


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.