The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31944

CVE-2026-31944: LibreChat Auth Bypass Vulnerability

CVE-2026-31944 is an authentication bypass flaw in LibreChat affecting versions 0.8.2 to 0.8.2-rc3. Attackers can hijack OAuth tokens to take over MCP-linked services. This article covers technical details, impact, and mitigation.

Published: March 20, 2026

CVE-2026-31944 Overview

CVE-2026-31944 is an authentication bypass vulnerability in LibreChat, a ChatGPT clone with additional features. The vulnerability exists in the MCP (Model Context Protocol) OAuth callback endpoint, which accepts redirects from identity providers and stores OAuth tokens without properly verifying that the browser accessing the redirect URL is logged in or that the authenticated user matches the user who initiated the OAuth flow.

This flaw enables a sophisticated attack where an attacker can send an authorization URL to a victim. When the victim completes the OAuth authentication flow, their OAuth tokens are incorrectly stored on the attacker's LibreChat account rather than their own. This enables complete account takeover of the victim's MCP-linked services, including enterprise platforms such as Atlassian and Outlook.

Critical Impact

Attackers can hijack OAuth tokens for MCP-linked services (Atlassian, Outlook, etc.) by tricking victims into completing OAuth flows, enabling unauthorized access to victim accounts on connected platforms.

Affected Products

  • LibreChat 0.8.2
  • LibreChat 0.8.2-rc1
  • LibreChat 0.8.2-rc2
  • LibreChat 0.8.2-rc3

Discovery Timeline

  • 2026-03-13 - CVE CVE-2026-31944 published to NVD
  • 2026-03-17 - Last updated in NVD database

Technical Details for CVE-2026-31944

Vulnerability Analysis

This vulnerability is classified under CWE-306 (Missing Authentication for Critical Function). The core issue lies in the MCP OAuth callback endpoint's failure to implement proper session binding and user verification during the OAuth token exchange process.

In a properly implemented OAuth flow, the callback endpoint should verify that the user who initiated the authorization request is the same user completing the flow. This is typically accomplished through state parameters, session cookies, or other binding mechanisms that cryptographically tie the OAuth session to a specific authenticated user.

LibreChat's implementation accepts OAuth tokens and stores them based solely on information contained within the OAuth flow itself, without cross-referencing the current authenticated session or validating user identity. This architectural oversight creates a critical authentication bypass that can be exploited through social engineering.

The vulnerability has a network-based attack vector requiring low privileges and user interaction. The impact is significant, with high confidentiality impact due to unauthorized access to connected service accounts, and low integrity impact through potential unauthorized actions on linked platforms.

Root Cause

The root cause of this vulnerability is the absence of proper session binding in the MCP OAuth callback handler. The endpoint fails to implement critical security checks:

  1. Missing session validation: The callback endpoint does not verify that a valid LibreChat session exists for the requesting browser
  2. No user binding verification: There is no mechanism to ensure the user completing the OAuth flow matches the user who initiated it
  3. Improper state parameter handling: The OAuth state parameter is not properly tied to a specific authenticated user session

This allows attackers to craft authorization URLs that, when completed by victims, result in OAuth tokens being stored against the attacker's account rather than the victim's account.

Attack Vector

The attack follows a social engineering approach combined with the OAuth flow manipulation:

  1. Preparation: The attacker creates a LibreChat account and initiates an MCP OAuth connection to a target service (e.g., Atlassian, Outlook)
  2. URL Capture: The attacker captures the authorization URL before completing their own OAuth flow
  3. Victim Targeting: The attacker sends this authorization URL to a victim through phishing or other social engineering methods
  4. Victim Completion: When the victim clicks the link and authenticates with their own credentials on the identity provider, they unknowingly complete the OAuth flow
  5. Token Hijacking: The victim's OAuth tokens are stored on the attacker's LibreChat account due to the missing session binding
  6. Account Access: The attacker can now access the victim's MCP-linked services through their own LibreChat account

For technical details and exploitation specifics, refer to the GitHub Security Advisory.

Detection Methods for CVE-2026-31944

Indicators of Compromise

  • OAuth callback requests from IP addresses or user agents inconsistent with the user who initiated the OAuth flow
  • Multiple OAuth token storage events for different identity provider accounts linked to a single LibreChat user
  • Unusual access patterns to MCP-linked services from previously inactive LibreChat accounts
  • Discrepancies between OAuth authorization initiation timestamps and callback completion timestamps

Detection Strategies

  • Implement logging for all OAuth callback events, capturing session identifiers, IP addresses, and user agent strings
  • Monitor for OAuth flows where the callback completion occurs from a different client than the initiation
  • Alert on patterns of OAuth token acquisition that suggest token harvesting (multiple tokens for different users)
  • Review MCP service access logs for unusual patterns following OAuth token acquisitions

Monitoring Recommendations

  • Enable detailed audit logging for all OAuth-related endpoints in LibreChat
  • Configure alerts for OAuth callback events with mismatched session data
  • Monitor connected MCP services (Atlassian, Outlook) for unauthorized access patterns
  • Implement rate limiting and anomaly detection on OAuth flow initiations

How to Mitigate CVE-2026-31944

Immediate Actions Required

  • Upgrade LibreChat to version 0.8.3-rc1 or later immediately
  • Review existing OAuth token associations for any suspicious linkages
  • Revoke and reauthorize all MCP OAuth connections after upgrading
  • Notify users to review their connected service accounts for unauthorized access

Patch Information

The vulnerability has been addressed in LibreChat version 0.8.3-rc1. The fix implements proper session binding and user verification in the MCP OAuth callback endpoint. Organizations should upgrade to this version or later to remediate the vulnerability.

For complete patch details, see the GitHub Security Advisory for GHSA-vf7j-7mrx-hp7g.

Workarounds

  • Disable MCP OAuth integrations until the patch can be applied
  • Implement network-level access controls to restrict OAuth callback endpoints to known, trusted IP ranges
  • Train users to be cautious of unexpected OAuth authorization requests
  • Consider implementing additional WAF rules to detect and block suspicious OAuth callback patterns
bash
# Configuration example - Disable MCP integrations in LibreChat
# Add to your LibreChat configuration or environment variables
MCP_ENABLED=false
OAUTH_MCP_INTEGRATIONS_ENABLED=false

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechLibrechat

  • SeverityHIGH

  • CVSS Score7.6

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityLow
  • AvailabilityNone
  • CWE References
  • CWE-306
  • Vendor Resources
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-31950: LibreChat Auth Bypass Vulnerability

  • CVE-2025-41258: LibreChat Auth Bypass Vulnerability

  • CVE-2026-33265: LibreChat Auth Bypass Vulnerability

  • CVE-2025-69220: LibreChat Auth Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English