Description
LobeHub is a work-and-lifestyle space to find, build, and collaborate with agent teammates that grow with you. Prior to 2.1.48, the webapi authentication layer trusts a client-controlled X-lobe-chat-auth header that is only XOR-obfuscated, not signed or otherwise authenticated. Because the XOR key is hardcoded in the repository, an attacker can forge arbitrary auth payloads and bypass authentication on protected webapi routes. Affected routes include /webapi/chat/[provider], /webapi/models/[provider], /webapi/models/[provider]/pull, and /webapi/create-image/comfyui. This vulnerability is fixed in 2.1.48.
Published: 2026-04-08
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass enabling unauthorized access to protected web API routes
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to forge an X‑lobe‑chat‑auth header that bypasses the authentication logic on multiple API endpoints, including chat, model retrieval, model pulling, and image creation. This bypass can lead to unauthorized execution of privileged actions and exposure of sensitive data. The weakness stems from using a hard‑coded XOR key for obfuscation without proper authentication or signing, satisfying CWE‑287 and CWE‑290.

Affected Systems

All installations of LobeHub running a version older than 2.1.48 are susceptible. The affected product is the LobeHub application as distributed in the public repository. Endpoints such as /webapi/chat/[provider], /webapi/models/[provider], /webapi/models/[provider]/pull, and /webapi/create-image/comfyui are unprotected for attackers who craft a forged header.

Risk and Exploitability

The CVSS score of 5.0 indicates a medium severity, but the lack of an authentication step makes this a straightforward exploit over the network, as long as the target is reachable. No exploit probability score is provided, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector involves sending an HTTP request with a forged X‑lobe‑chat‑auth header to any of the exposed webapi routes, allowing the attacker to impersonate a legitimate user and gain access to protected functionality.

Generated by OpenCVE AI on April 8, 2026 at 20:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LobeHub to version 2.1.48 or later, which removes the insecure header handling.

Generated by OpenCVE AI on April 8, 2026 at 20:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5mwj-v5jw-5c97 LobeHub: Unauthenticated authentication bypass on `webapi` routes via forgeable `X-lobe-chat-auth` header
History

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:lobehub:lobehub:*:*:*:*:*:node.js:*:*

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Lobehub
Lobehub lobehub
Vendors & Products Lobehub
Lobehub lobehub

Wed, 08 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description LobeHub is a work-and-lifestyle space to find, build, and collaborate with agent teammates that grow with you. Prior to 2.1.48, the webapi authentication layer trusts a client-controlled X-lobe-chat-auth header that is only XOR-obfuscated, not signed or otherwise authenticated. Because the XOR key is hardcoded in the repository, an attacker can forge arbitrary auth payloads and bypass authentication on protected webapi routes. Affected routes include /webapi/chat/[provider], /webapi/models/[provider], /webapi/models/[provider]/pull, and /webapi/create-image/comfyui. This vulnerability is fixed in 2.1.48.
Title LobeHub has an unauthenticated authentication bypass on `webapi` routes via forgeable `X-lobe-chat-auth` header
Weaknesses CWE-287
CWE-290
CWE-345
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T20:15:22.363Z

Reserved: 2026-04-07T00:23:30.595Z

Link: CVE-2026-39411

cve-icon Vulnrichment

Updated: 2026-04-08T20:15:17.012Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T20:16:25.560

Modified: 2026-04-20T15:03:17.493

Link: CVE-2026-39411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:37Z

Weaknesses