Cyber Posture

CVE-2026-33265

MediumPublic PoC

Published: 18 March 2026

Published
18 March 2026
Modified
24 March 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
EPSS Score 0.0008 24.2th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33265 is a medium-severity Incorrect Resource Transfer Between Spheres (CWE-669) vulnerability in Librechat Librechat. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 24.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-4 (Information Flow Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for information flow between the LibreChat API and RAG API spheres, directly preventing incorrect resource transfer via shared JWT tokens.

prevent

Mandates enforcement of access control policies at each API, blocking unauthorized access enabled by JWT validity across boundaries.

prevent

Applies least privilege to restrict JWT scopes to only the intended API, mitigating over-privileging that allows exploitation across APIs.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1550.001 Application Access Token Lateral Movement
Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems.
Why these techniques?

The auth bypass allows a low-privileged logged-in user to misuse a legitimately obtained JWT for unauthorized RAG API access (scope change), directly enabling exploitation for privilege escalation and use of application access tokens as alternate authentication material.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

In LibreChat 0.8.1-rc2, a logged-in user obtains a JWT for both the LibreChat API and the RAG API.

Deeper analysisAI

CVE-2026-33265 is a vulnerability in LibreChat version 0.8.1-rc2, where a logged-in user obtains a JWT token valid for both the LibreChat API and the RAG API. This issue, published on 2026-03-18, carries a CVSS v3.1 base score of 6.3 (AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L) and maps to CWE-669 (Incorrect Resource Transfer Between Spheres), indicating improper handling of authentication credentials across API boundaries.

The attack requires a local, low-privileged adversary, such as an authenticated user, who can exploit it with low complexity and no user interaction. Exploitation changes the scope and enables limited impacts on confidentiality, integrity, and availability, likely through unauthorized access enabled by the shared JWT validity.

Advisories provide further details on mitigation; refer to the SBA Research advisory at https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20251205-01_LibreChat_RAG_API_Authentication_Bypass, which addresses the RAG API authentication bypass, and the OSS-Security mailing list announcement at https://www.openwall.com/lists/oss-security/2026/03/18/3.

Details

CWE(s)

Affected Products

librechat
librechat
0.8.1

CVEs Like This One

CVE-2025-69220Same product: Librechat Librechat
CVE-2025-41258Same product: Librechat Librechat
CVE-2025-69222Same product: Librechat Librechat
CVE-2026-31943Same product: Librechat Librechat
CVE-2026-31944Same product: Librechat Librechat
CVE-2024-10361Same product: Librechat Librechat
CVE-2026-31945Same product: Librechat Librechat
CVE-2026-22252Same product: Librechat Librechat
CVE-2026-31431Shared CWE-669
CVE-2025-41660Shared CWE-669

References