Impact
An authenticated LibreChat user can retrieve a JSON Web Token that authorizes them to call the RAG API, bypassing the intended separation between the LibreChat API and the RAG API. Because the token can be used to invoke any operation that the RAG API supports, an attacker might read, update, or delete RAG‑specific data, thereby impacting confidentiality and integrity. The flaw is classified as CWE‑669, an unintended cross‑component access control violation. Based on the description, it is inferred that the misuse of the token would allow the attacker to perform the full set of RAG API actions, which could include sensitive data exposure or alteration.
Affected Systems
The vulnerability targets LibreChat version 0.8.1‑rc2, affecting all deployments of that release on any platform. The issue resides in the token issuance endpoint for that specific release; newer stable releases that contain the fixed logic are not affected at this time.
Risk and Exploitability
The CVSS score of 6.3 denotes medium severity, while the EPSS score of less than 1% indicates a low likelihood of exploitation currently. The attack vector requires the user to be already authenticated to the application, so it is local from an attacker’s perspective (or requires compromised credentials). No public exploits are documented, as the vulnerability is not listed in CISA’s KEV catalog. Nonetheless, the potential for data compromise or policy violation remains significant for organizations running the affected version.
OpenCVE Enrichment