Skip to content

feature/AIA-2203- Add Prompt Catalog Insert to LibreChat#144

Merged
paychex-joser merged 4 commits intodevelopfrom
feature/prompt-catalog-integration
Apr 28, 2026
Merged

feature/AIA-2203- Add Prompt Catalog Insert to LibreChat#144
paychex-joser merged 4 commits intodevelopfrom
feature/prompt-catalog-integration

Conversation

@gmarcelino-paychex
Copy link
Copy Markdown

Implements server-side Prompt Catalog deep-link integration, enabling AI Hub to open LibreChat with a Prompt Catalog ID that resolves to prompt text without exposing full prompts in URLs.

What Changed

  • Backend: Added /api/prompthub/resolve-insert route that fetches prompt content from Prompt Catalog API with authenticated user identity headers
  • API Layer: Created @librechat/api handlers for server-side prompt resolution with timeout and error handling
  • Client: Enhanced query param handling to resolve promptCatalogId, inject content into composer, and display user-facing error toasts on failure
  • Config: Added PROMPT_CATALOG_API_URL environment variable

Version 2.3.33 was removed by Checkmarx (all prior tags deleted) following a security fix. 2.3.36 is the only available and currently supported tag.

Made-with: Cursor
@github-actions
Copy link
Copy Markdown

Logo
Checkmarx One – Scan Summary & Details850b9626-a63a-480d-910a-06b4d56fc20b


New Issues (512) Checkmarx found the following issues in this Pull Request
# Severity Issue Source File / Package Checkmarx Insight
1 CRITICAL CVE-2026-33937 Npm-handlebars-4.7.8
detailsRecommended version: 4.7.9
Description: Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `Handlebars.compile()` accepts a pr...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
2 CRITICAL CVE-2026-33943 Npm-happy-dom-20.8.3
detailsRecommended version: 20.8.9
Description: A code injection vulnerability in `ECMAScriptModuleCompiler` allows an attacker to achieve Remote Code Execution (RCE) by injecting arbitrary JavaS...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
3 CRITICAL CVE-2026-41242 Npm-protobufjs-7.4.0
detailsRecommended version: 7.5.5
Description: protobufjs compiles protobuf definitions into JS functions. Attackers can manipulate these definitions to execute arbitrary JS code. This affects v...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
4 CRITICAL CVE-2026-41242 Npm-protobufjs-8.0.0
detailsRecommended version: 8.0.1
Description: protobufjs compiles protobuf definitions into JS functions. Attackers can manipulate these definitions to execute arbitrary JS code. This affects v...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
5 CRITICAL CVE-2026-4800 Npm-lodash-4.17.23
detailsRecommended version: 4.18.0
Description: The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to "options.imports" key na...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
6 HIGH CVE-2023-30533 Npm-xlsx-0.18.5
detailsDescription: In SheetJS(xlsx) Community Edition versions prior to 0.19.3 allows Prototype Pollution via a crafted file.
Attack Vector: LOCAL
Attack Complexity: LOW
Vulnerable Package
7 HIGH CVE-2024-22363 Npm-xlsx-0.18.5
detailsDescription: SheetJS Community Edition versions prior to 0.20.2 is vulnerable to Regular Expression Denial of Service (ReDoS).
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
8 HIGH CVE-2026-27795 Npm-@langchain/core-0.3.80
detailsRecommended version: 1.1.21
Description: LangChain is a framework for building LLM-powered applications. Prior to version 1.1.18, a redirect-based Server-Side Request Forgery (SSRF) bypass...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
9 HIGH CVE-2026-33671 Npm-picomatch-4.0.3
detailsRecommended version: 4.0.4
Description: `picomatch` is vulnerable prior to 2.3.2, 3.x prior to 3.0.2 and 4.x prior to 4.0.4, to Regular Expression Denial of Service (ReDoS) when processi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
10 HIGH CVE-2026-33671 Npm-picomatch-2.3.1
detailsRecommended version: 2.3.2
Description: `picomatch` is vulnerable prior to 2.3.2, 3.x prior to 3.0.2 and 4.x prior to 4.0.4, to Regular Expression Denial of Service (ReDoS) when processi...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
11 HIGH CVE-2026-33938 Npm-handlebars-4.7.8
detailsRecommended version: 4.7.9
Description: Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the `@partial-block` special variab...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
12 HIGH CVE-2026-33939 Npm-handlebars-4.7.8
detailsRecommended version: 4.7.9
Description: Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, when a Handlebars template contains...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
13 HIGH CVE-2026-33940 Npm-handlebars-4.7.8
detailsRecommended version: 4.7.9
Description: Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, a crafted object placed in the temp...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
14 HIGH CVE-2026-33941 Npm-handlebars-4.7.8
detailsRecommended version: 4.7.9
Description: Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the Handlebars CLI precompiler (`bi...
Attack Vector: LOCAL
Attack Complexity: LOW
Vulnerable Package
15 HIGH CVE-2026-34043 Npm-serialize-javascript-7.0.4
detailsRecommended version: 7.0.5
Description: Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial-of-Service (D...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
16 HIGH CVE-2026-34226 Npm-happy-dom-20.8.3
detailsRecommended version: 20.8.9
Description: Happy DOM is a JavaScript implementation of a web browser without its graphical user interface. Versions prior to 20.8.9 may attach cookies from th...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
17 HIGH CVE-2026-34601 Npm-@xmldom/xmldom-0.8.10
detailsRecommended version: 0.8.12
Description: xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions through 0.6.0 and ...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
18 HIGH CVE-2026-39363 Npm-vite-7.3.1
detailsRecommended version: 7.3.2
Description: Vite is a frontend tooling framework for JavaScript. From 6.0.0 prior to 6.4.2, 7.0.0 prior to 7.3.2, and 8.0.0 prior to 8.0.5, if it is possible t...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
19 HIGH CVE-2026-39364 Npm-vite-7.3.1
detailsRecommended version: 7.3.2
Description: Vite is a frontend tooling framework for JavaScript. From 7.1.0 to before 7.3.2 and 8.0.0 prior to 8.0.5, on the Vite dev server, files that should...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
20 HIGH CVE-2026-40897 Npm-mathjs-15.1.0
detailsRecommended version: 15.2.0
Description: This security vulnerability allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an applic...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
21 HIGH CVE-2026-41139 Npm-mathjs-15.1.0
detailsRecommended version: 15.2.0
Description: Two security vulnerabilities were detected in mathjs versions 13.1.0 prior to 15.2.0, which allowed execution of arbitrary JavaScript via the mathj...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
22 HIGH CVE-2026-4926 Npm-path-to-regexp-8.2.0
detailsRecommended version: 8.4.0
Description: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as "{a}{b}{c}:z". The genera...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
23 HIGH Reflected_XSS api/server/routes/agents/index.js: 55
detailsThe method Cxc3c278a1 embeds untrusted data in generated output with write, at line 81 of /api/server/routes/agents/index.js. This untrusted data...
Attack Vector
24 HIGH Reflected_XSS packages/api/src/mcp/__tests__/helpers/oauthTestServer.ts: 115
detailsThe method Lambda embeds untrusted data in generated output with end, at line 144 of /packages/api/src/mcp/__tests__/helpers/oauthTestServer.t...
Attack Vector
25 HIGH Reflected_XSS api/server/controllers/AuthController.js: 68
detailsThe method Cx1cd82e68 embeds untrusted data in generated output with send, at line 162 of /api/server/controllers/AuthController.js. This untrust...
Attack Vector
26 HIGH Reflected_XSS api/server/controllers/AuthController.js: 68
detailsThe method Cx1cd82e68 embeds untrusted data in generated output with send, at line 147 of /api/server/controllers/AuthController.js. This untrust...
Attack Vector
27 HIGH Reflected_XSS api/server/routes/agents/index.js: 55
detailsThe method Lambda embeds untrusted data in generated output with write, at line 111 of /api/server/routes/agents/index.js. This untrusted data is...
Attack Vector
28 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 732
detailsThe method Lambda embeds untrusted data in generated output with location, at line 739 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
29 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 684
detailsThe method Lambda embeds untrusted data in generated output with location, at line 691 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
30 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 797
detailsThe method Lambda embeds untrusted data in generated output with location, at line 804 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
31 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 844
detailsThe method Lambda embeds untrusted data in generated output with location, at line 851 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
32 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 1628
detailsThe method Lambda embeds untrusted data in generated output with location, at line 1633 of /api/server/routes/__tests__/mcp.spec.js. This un...
Attack Vector
33 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 1682
detailsThe method Lambda embeds untrusted data in generated output with location, at line 1686 of /api/server/routes/__tests__/mcp.spec.js. This un...
Attack Vector
34 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 458
detailsThe method Lambda embeds untrusted data in generated output with location, at line 462 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
35 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 545
detailsThe method Lambda embeds untrusted data in generated output with location, at line 552 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
36 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 590
detailsThe method Lambda embeds untrusted data in generated output with location, at line 597 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
37 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 632
detailsThe method Lambda embeds untrusted data in generated output with location, at line 639 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
38 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 481
detailsThe method Lambda embeds untrusted data in generated output with location, at line 485 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
39 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 435
detailsThe method Lambda embeds untrusted data in generated output with location, at line 439 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
40 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 366
detailsThe method Lambda embeds untrusted data in generated output with location, at line 373 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
41 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 309
detailsThe method Lambda embeds untrusted data in generated output with location, at line 315 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector
42 HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 319
detailsThe method Lambda embeds untrusted data in generated output with location, at line 325 of /api/server/routes/__tests__/mcp.spec.js. This unt...
Attack Vector

More results are available on the CxOne platform


Fixed Issues (120) Great job! The following issues were fixed in this Pull Request
Severity Issue Source File / Package
CRITICAL CVE-2025-68665 Npm-@langchain/core-0.3.79
CRITICAL CVE-2026-25547 Npm-@isaacs/brace-expansion-5.0.0
HIGH CVE-2025-66414 Npm-@modelcontextprotocol/sdk-1.21.0
HIGH CVE-2026-0621 Npm-@modelcontextprotocol/sdk-1.21.0
HIGH CVE-2026-22036 Npm-undici-7.16.0
HIGH CVE-2026-25128 Npm-fast-xml-parser-4.4.1
HIGH CVE-2026-25128 Npm-fast-xml-parser-5.0.9
HIGH CVE-2026-25128 Npm-fast-xml-parser-5.2.5
HIGH CVE-2026-25536 Npm-@modelcontextprotocol/sdk-1.21.0
HIGH CVE-2026-25639 Npm-axios-1.12.1
HIGH Reflected_XSS api/server/controllers/AuthController.js: 63
HIGH Reflected_XSS api/server/controllers/AuthController.js: 63
HIGH Reflected_XSS api/server/controllers/UserController.js: 115
HIGH Reflected_XSS api/server/controllers/auth/LogoutController.js: 8
HIGH Reflected_XSS api/server/controllers/AuthController.js: 63
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 594
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 1365
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 1413
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 454
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 495
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 553
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 338
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 270
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 261
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 374
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 409
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 281
HIGH Reflected_XSS api/server/routes/__tests__/mcp.spec.js: 251
MEDIUM CVE-2025-13465 Npm-lodash-4.17.21
MEDIUM CVE-2025-13466 Npm-body-parser-2.2.0
MEDIUM CVE-2025-15284 Npm-qs-6.14.0
MEDIUM CVE-2025-15284 Npm-qs-6.13.0
MEDIUM CVE-2025-68470 Npm-@remix-run/router-1.15.0
MEDIUM CVE-2025-68470 Npm-react-router-6.22.0
MEDIUM CVE-2026-22029 Npm-@remix-run/router-1.15.0
MEDIUM CVE-2026-2391 Npm-qs-6.13.0
MEDIUM CVE-2026-2391 Npm-qs-6.14.0
MEDIUM CVE-2026-25528 Npm-langsmith-0.3.67
MEDIUM Open_Redirect api/server/routes/mcp.js: 39
MEDIUM Open_Redirect api/server/routes/mcp.js: 38
MEDIUM Open_Redirect api/server/routes/mcp.js: 91
MEDIUM Open_Redirect api/server/routes/mcp.js: 90
MEDIUM Privacy_Violation api/server/controllers/AuthController.js: 169
MEDIUM Unchecked_Input_for_Loop_Condition api/app/clients/BaseClient.js: 173
MEDIUM Unchecked_Input_for_Loop_Condition api/app/clients/BaseClient.js: 173
MEDIUM Unchecked_Input_for_Loop_Condition api/app/clients/BaseClient.js: 173
MEDIUM Use_Of_Hardcoded_Password packages/api/src/mcp/__tests__/mcp.spec.ts: 505
MEDIUM Use_Of_Hardcoded_Password packages/api/src/mcp/__tests__/mcp.spec.ts: 497
MEDIUM Use_Of_Hardcoded_Password packages/api/src/mcp/__tests__/mcp.spec.ts: 490
LOW CVE-2025-68157 Npm-webpack-5.94.0
LOW CVE-2025-68458 Npm-webpack-5.94.0
LOW CVE-2026-24001 Npm-diff-4.0.2
LOW CVE-2026-24001 Npm-diff-7.0.0
LOW Missing_CSP_Header api/server/controllers/agents/v1.js: 152
LOW PCI_Data_Exposure_in_Error_Messages api/models/Transaction.js: 51
LOW PCI_Data_Exposure_in_Logs api/models/Transaction.js: 38
LOW PCI_Data_Exposure_in_Logs api/models/Transaction.js: 51
LOW PCI_Data_Exposure_in_Logs api/models/Transaction.js: 38
LOW PCI_Data_Exposure_in_Logs api/models/Transaction.js: 51
LOW Privacy_Violation_in_JWT api/server/services/AuthService.js: 462
LOW Secret_Leak_in_Error_Messages api/app/clients/BaseClient.js: 214
LOW Secret_Leak_in_Error_Messages api/app/clients/BaseClient.js: 208
LOW Secret_Leak_in_Error_Messages api/app/clients/BaseClient.js: 214
LOW Secret_Leak_in_Error_Messages api/app/clients/BaseClient.js: 208
LOW Secret_Leak_in_Error_Messages api/app/clients/BaseClient.js: 214
LOW Secret_Leak_in_Error_Messages api/app/clients/BaseClient.js: 207
LOW Secret_Leak_in_Error_Messages api/app/clients/BaseClient.js: 208
LOW Secret_Leak_in_Error_Messages packages/api/src/cache/cacheConfig.ts: 23
LOW Secret_Leak_in_Error_Messages api/app/clients/BaseClient.js: 214
LOW Secret_Leak_in_Error_Messages packages/api/src/mcp/registry/MCPServersRegistry.ts: 51
LOW Secret_Leak_in_Error_Messages packages/api/src/mcp/UserConnectionManager.ts: 60
LOW Secret_Leak_in_Error_Messages packages/api/src/mcp/UserConnectionManager.ts: 103
LOW Secret_Leak_in_URL api/server/routes/mcp.js: 69
LOW Secret_Leak_in_URL api/server/routes/mcp.js: 566
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 90
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 91
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 97
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 97
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 98
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 90
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 85
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 84
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 66
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 67
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 84
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 79
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 78
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 78
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 73
LOW Use_of_Deprecated_or_Obsolete_Functions packages/api/src/auth/domain.spec.ts: 72

More results are available on the CxOne platform

Remove the leading slash from the URL path template so that any path
prefix in PROMPT_CATALOG_API_URL is preserved rather than silently
discarded by the URL origin-relative resolution rules.

Made-with: Cursor
@paychex-joser paychex-joser merged commit e1a50fc into develop Apr 28, 2026
1 of 3 checks passed
@paychex-joser paychex-joser deleted the feature/prompt-catalog-integration branch April 28, 2026 14:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants