Authentication Bypass in LibreChat Affects User Session Security
CVE-2025-41258
8HIGH
What is CVE-2025-41258?
LibreChat version 0.8.1-rc2 suffers from an authentication bypass vulnerability due to the usage of a shared JSON Web Token (JWT) secret for both user sessions and the RAG API. This design flaw potentially allows unauthorized access to the RAG API, undermining its service-level authentication and exposing sensitive user data. It is crucial for users and system administrators to review and apply necessary mitigations to prevent unauthorized access.
Affected Version(s)
LibreChat 0.8.1-rc2
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lisa Gnedt (SBA Research)
Michael Koppmann (SBA Research)
