Description
LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechanism and RAG API which compromises the service-level authentication of the RAG API.
Published: 2026-03-18
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Apply Patch
AI Analysis

Impact

LibreChat version 0.8.1‑rc2 reuses the same JWT secret for its user sessions and for the Retrieval‑Augmented Generation (RAG) API. This design flaw permits an attacker who can obtain or guess a valid session token to craft requests that appear authenticated to the RAG API, effectively bypassing service‑level protection. The consequence is unauthorized access to the RAG endpoint, potentially exposing or manipulating sensitive data. The weakness corresponds to improper authorization (CWE‑284).

Affected Systems

The affected product is LibreChat developed by Danny Avila. The vulnerability exists in the 0.8.1‑rc2 release. Any deployment that relies on this exact version without a distinct JWT secret configuration is exposed.

Risk and Exploitability

The CVSS base score of 8 indicates high severity. The EPSS score of less than 1% suggests a low probability of active exploitation at present, and the issue is not listed in CISA’s KEV catalog. The likely attack vector is remote access to the RAG API over the network, provided the attacker can obtain or guess a session token. Although the description does not explicitly state the path, this inference is based on the shared JWT usage and typical RAG API exposure. If an attacker succeeds, they could impersonate legitimate users and retrieve or modify data through the RAG endpoint.

Generated by OpenCVE AI on March 24, 2026 at 19:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LibreChat to a version that separates the JWT secrets for session handling and the RAG API, such as the latest release.
  • If an upgrade is not immediately possible, configure the application to use distinct JWT secrets for user sessions and for the RAG API.
  • Verify that RAG API requests require a valid, non‑shared token and enforce proper authorization checks.
  • Monitor API traffic for anomalous authentication attempts and review logs for suspicious activity.

Generated by OpenCVE AI on March 24, 2026 at 19:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Librechat
Librechat librechat
CPEs cpe:2.3:a:librechat:librechat:0.8.1:rc2:*:*:*:*:*:*
Vendors & Products Librechat
Librechat librechat

Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Danny-avila
Danny-avila libre Chat
Vendors & Products Danny-avila
Danny-avila libre Chat

Wed, 18 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Mar 2026 11:30:00 +0000

Type Values Removed Values Added
Description LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechanism and RAG API which compromises the service-level authentication of the RAG API.
Title LibreChat RAG API Authentication Bypass
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Danny-avila Libre Chat
Librechat Librechat
cve-icon MITRE

Status: PUBLISHED

Assigner: sba-research

Published:

Updated: 2026-03-18T14:19:49.089Z

Reserved: 2025-04-16T09:37:50.631Z

Link: CVE-2025-41258

cve-icon Vulnrichment

Updated: 2026-03-18T14:19:43.810Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T12:16:18.713

Modified: 2026-03-24T18:41:38.697

Link: CVE-2025-41258

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:52:50Z

Weaknesses