


Perceptive Security
SOC/SIEM Consultancy

LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechanism and RAG API which compromises the service-level authentication of the RAG AP…
Published:
17 March 2026 at 23:00:00
Alert date:
18 March 2026 at 13:01:37
Source:
nvd.nist.gov
Web Technologies, Identity & Access
LibreChat version 0.8.1-rc2 contains a critical authentication vulnerability where the same JWT secret is used for both user session mechanism and RAG API authentication. This shared secret compromises the service-level authentication of the RAG API, potentially allowing unauthorized access. The vulnerability affects the authentication mechanisms that protect API access controls. Users should upgrade to a patched version to remediate this authentication bypass issue.
Technical details
Mitigation steps:
Affected products:
LibreChat
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-41258
https://github.com/danny-avila/LibreChat
https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20251205-01_LibreChat_RAG_API_Authentication_Bypass
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
