CVE-2026-39413

LightRAG provides simple and fast retrieval-augmented generation. Prior to 1.4.14, the LightRAG API is vulnerable to a JWT algorithm confusion attack where an attacker can forge tokens by specifying 'alg': 'none' in the JWT header. Since the jwt.decode() call does not explicitly deny the 'none' algorithm, a crafted token without a signature will be accepted as valid, leading to unauthorized access. This vulnerability is fixed in 1.4.14.
Configurations

No configuration.

History

08 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-08 20:16

Updated : 2026-04-08 21:26


NVD link : CVE-2026-39413

Mitre link : CVE-2026-39413

CVE.ORG link : CVE-2026-39413


JSON object : View

Products Affected

No product.

CWE
CWE-347

Improper Verification of Cryptographic Signature