Authentication Bypass in LibreChat Affects User Session Security
CVE-2025-41258

8HIGH

Key Information:

Status
Vendor
CVE Published:
18 March 2026

What is CVE-2025-41258?

LibreChat version 0.8.1-rc2 suffers from an authentication bypass vulnerability due to the usage of a shared JSON Web Token (JWT) secret for both user sessions and the RAG API. This design flaw potentially allows unauthorized access to the RAG API, undermining its service-level authentication and exposing sensitive user data. It is crucial for users and system administrators to review and apply necessary mitigations to prevent unauthorized access.

Affected Version(s)

LibreChat 0.8.1-rc2

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lisa Gnedt (SBA Research)
Michael Koppmann (SBA Research)
.