LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechanism and RAG API which compromises the service-level authentication of the RAG API.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/LibreChat | Product |
| https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20251205-01_LibreChat_RAG_API_Authentication_Bypass | Exploit Third Party Advisory |
Configurations
History
24 Mar 2026, 18:41
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Librechat
Librechat librechat |
|
| CPE | cpe:2.3:a:librechat:librechat:0.8.1:rc2:*:*:*:*:*:* | |
| References | () https://github.com/danny-avila/LibreChat - Product | |
| References | () https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20251205-01_LibreChat_RAG_API_Authentication_Bypass - Exploit, Third Party Advisory |
18 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-18 12:16
Updated : 2026-03-24 18:41
NVD link : CVE-2025-41258
Mitre link : CVE-2025-41258
CVE.ORG link : CVE-2025-41258
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-284
Improper Access Control
