Impact
LibreChat version 0.8.1‑rc2 reuses the same JWT secret for its user sessions and for the Retrieval‑Augmented Generation (RAG) API. This design flaw permits an attacker who can obtain or guess a valid session token to craft requests that appear authenticated to the RAG API, effectively bypassing service‑level protection. The consequence is unauthorized access to the RAG endpoint, potentially exposing or manipulating sensitive data. The weakness corresponds to improper authorization (CWE‑284).
Affected Systems
The affected product is LibreChat developed by Danny Avila. The vulnerability exists in the 0.8.1‑rc2 release. Any deployment that relies on this exact version without a distinct JWT secret configuration is exposed.
Risk and Exploitability
The CVSS base score of 8 indicates high severity. The EPSS score of less than 1% suggests a low probability of active exploitation at present, and the issue is not listed in CISA’s KEV catalog. The likely attack vector is remote access to the RAG API over the network, provided the attacker can obtain or guess a session token. Although the description does not explicitly state the path, this inference is based on the shared JWT usage and typical RAG API exposure. If an attacker succeeds, they could impersonate legitimate users and retrieve or modify data through the RAG endpoint.
OpenCVE Enrichment