Impact
The vulnerability allows an attacker to forge an X‑lobe‑chat‑auth header that bypasses the authentication logic on multiple API endpoints, including chat, model retrieval, model pulling, and image creation. This bypass can lead to unauthorized execution of privileged actions and exposure of sensitive data. The weakness stems from using a hard‑coded XOR key for obfuscation without proper authentication or signing, satisfying CWE‑287 and CWE‑290.
Affected Systems
All installations of LobeHub running a version older than 2.1.48 are susceptible. The affected product is the LobeHub application as distributed in the public repository. Endpoints such as /webapi/chat/[provider], /webapi/models/[provider], /webapi/models/[provider]/pull, and /webapi/create-image/comfyui are unprotected for attackers who craft a forged header.
Risk and Exploitability
The CVSS score of 5.0 indicates a medium severity, but the lack of an authentication step makes this a straightforward exploit over the network, as long as the target is reachable. No exploit probability score is provided, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector involves sending an HTTP request with a forged X‑lobe‑chat‑auth header to any of the exposed webapi routes, allowing the attacker to impersonate a legitimate user and gain access to protected functionality.
OpenCVE Enrichment
Github GHSA