CVE-2024-37895

Lobe Chat is an open-source LLMs/AI chat framework. In affected versions if an attacker can successfully authenticate through SSO/Access Code, they can obtain the real backend API Key by modifying the base URL to their own attack URL on the frontend and setting up a server-side request. This issue has been addressed in version 0.162.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*

History

08 Oct 2025, 16:08

Type Values Removed Values Added
First Time Lobehub
Lobehub lobe Chat
CPE cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*
References () https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v - () https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v - Vendor Advisory, Exploit

21 Nov 2024, 09:24

Type Values Removed Values Added
References () https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v - () https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v -

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) Lobe Chat es un framework de chat de IA/LLM de código abierto. En las versiones afectadas, si un atacante puede autenticarse exitosamente a través de SSO/Código de acceso, puede obtener la clave API de backend real modificando la URL base a su propia URL de ataque en la interfaz y configurando una solicitud del lado del servidor. Este problema se solucionó en la versión 0.162.25. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.

17 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-17 20:15

Updated : 2025-10-08 16:08


NVD link : CVE-2024-37895

Mitre link : CVE-2024-37895

CVE.ORG link : CVE-2024-37895


JSON object : View

Products Affected

lobehub

  • lobe_chat
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor