CVE-2025-41258
Published: 18 March 2026
Summary
CVE-2025-41258 is a high-severity Improper Access Control (CWE-284) vulnerability in Librechat Librechat. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires proper management of JWT secrets as authenticators, preventing their reuse across user sessions and RAG API authentication mechanisms.
Mandates unique identification and authentication for services like the RAG API, avoiding compromise via shared user session JWT secrets.
Enforces approved access authorizations for the RAG API, mitigating unauthorized access resulting from authentication bypass due to shared JWT secrets.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an authentication bypass in a service/API (RAG) due to shared secrets, directly enabling exploitation of the application for unauthorized access.
NVD Description
LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechanism and RAG API which compromises the service-level authentication of the RAG API.
Deeper analysisAI
CVE-2025-41258 is an improper access control vulnerability (CWE-284) in LibreChat version 0.8.1-rc2, published on 2026-03-18. The issue stems from the application using the same JWT secret for both the user session mechanism and the RAG API, which compromises service-level authentication for the RAG API. It carries a CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to significant impacts on confidentiality, integrity, and availability.
An attacker with low privileges on an adjacent network can exploit this vulnerability with low attack complexity and no user interaction required. Exploitation bypasses authentication for the RAG API, enabling unauthorized access that results in high-impact compromise across confidentiality, integrity, and availability.
Mitigation guidance is available in the SBA Research advisory (SBA-ADV-20251205-01_LibreChat_RAG_API_Authentication_Bypass) and the official LibreChat GitHub repository.
Details
- CWE(s)