Description
LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Context Protocol) OAuth callback endpoint accepts the redirect from the identity provider and stores OAuth tokens for the user who initiated the flow, without verifying that the browser hitting the redirect URL is logged in or that the logged-in user matches the initiator. An attacker can send the authorization URL to a victim; when the victim completes the flow, the victim’s OAuth tokens are stored on the attacker’s LibreChat account, enabling account takeover of the victim’s MCP-linked services (e.g. Atlassian, Outlook). This vulnerability is fixed in 0.8.3-rc1.
Published: 2026-03-13
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Token theft leading to account takeover via OAuth credentials
Action: Immediate Patch
AI Analysis

Impact

LibreChat’s MCP OAuth callback endpoint was found to accept and store access tokens without verifying that the browser initiating the callback is logged in or that the logged‑in user matches the flow’s initiator. As a result, an attacker can trick a victim into completing an OAuth flow to that attacker’s instance, resulting in the victim’s OAuth tokens being associated with the attacker’s LibreChat account. Once these tokens are stored, the attacker can access all MCP‑linked services for the victim (e.g., Atlassian, Outlook), effectively achieving an account takeover. The weakness is a missing authentication check for a critical operation (CWE‑306).

Affected Systems

CVE‑2026‑31944 affects LibreChat versions from 0.8.2 through 0.8.2‑rc3 inclusive, as indicated by the affected CPEs for 0.8.2, rc1, rc2, and rc3. Updated builds beginning with 0.8.3‑rc1 contain the fix that restores proper session validation.

Risk and Exploitability

With a CVSS score of 7.6, the vulnerability is considered high severity. The EPSS score is less than 1%, indicating a low probability of being actively exploited in the wild, and it is not listed in the CISA KEV catalog. Likely exploitation requires the attacker to lure a victim into completing an OAuth flow on the attacker’s LibreChat instance, which is achievable via phishing or malicious links. The attack path is remote and does not require local system compromise, relying solely on the victim’s interaction with the redirect URL.

Generated by OpenCVE AI on March 17, 2026 at 13:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LibreChat to version 0.8.3‑rc1 or later to enforce proper session validation in the OAuth callback.

Generated by OpenCVE AI on March 17, 2026 at 13:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Librechat
Librechat librechat
CPEs cpe:2.3:a:librechat:librechat:0.8.2:-:*:*:*:*:*:*
cpe:2.3:a:librechat:librechat:0.8.2:rc1:*:*:*:*:*:*
cpe:2.3:a:librechat:librechat:0.8.2:rc2:*:*:*:*:*:*
cpe:2.3:a:librechat:librechat:0.8.2:rc3:*:*:*:*:*:*
Vendors & Products Librechat
Librechat librechat

Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Danny-avila
Danny-avila libre Chat
Vendors & Products Danny-avila
Danny-avila libre Chat

Fri, 13 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Context Protocol) OAuth callback endpoint accepts the redirect from the identity provider and stores OAuth tokens for the user who initiated the flow, without verifying that the browser hitting the redirect URL is logged in or that the logged-in user matches the initiator. An attacker can send the authorization URL to a victim; when the victim completes the flow, the victim’s OAuth tokens are stored on the attacker’s LibreChat account, enabling account takeover of the victim’s MCP-linked services (e.g. Atlassian, Outlook). This vulnerability is fixed in 0.8.3-rc1.
Title LibreChat MCP OAuth callback does not validate browser session — allows token theft via redirect link
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}


Subscriptions

Danny-avila Libre Chat
Librechat Librechat
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T13:41:21.254Z

Reserved: 2026-03-10T15:10:10.656Z

Link: CVE-2026-31944

cve-icon Vulnrichment

Updated: 2026-03-16T13:41:15.558Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:39.590

Modified: 2026-03-17T12:39:41.723

Link: CVE-2026-31944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:40:08Z

Weaknesses