#VU124047 Improper Output Neutralization for Logs in RAG API - CVE-2026-4276
Published: March 17, 2026
RAG API
LibreChat
Description
The vulnerability allows a remote user to manipulate or forge log entries.
The vulnerability exists due to improper input validation in the log generation mechanism when processing user-supplied input in POST requests. A remote authenticated user can send a specially crafted request containing CRLF sequences in the file_id parameter to inject arbitrary log entries.
This vulnerability compromises the integrity of audit logs, potentially enabling obfuscation of malicious activity or downstream attacks such as cross-site scripting (XSS) if logs are displayed in a web-based console without proper sanitization.