CVE-2026-33265 Overview
CVE-2026-33265 is an authentication bypass vulnerability in LibreChat 0.8.1-rc2 that allows a logged-in user to obtain a JWT (JSON Web Token) valid for both the LibreChat API and the RAG (Retrieval-Augmented Generation) API. This improper resource transfer between spheres (CWE-669) enables authenticated users to potentially access RAG API functionality beyond their intended authorization scope.
Critical Impact
Authenticated users can leverage JWT tokens to access the RAG API with potentially elevated privileges, bypassing intended authorization boundaries between LibreChat and RAG API components.
Affected Products
- LibreChat 0.8.1-rc2
Discovery Timeline
- March 18, 2026 - CVE-2026-33265 published to NVD
- March 18, 2026 - Last updated in NVD database
Technical Details for CVE-2026-33265
Vulnerability Analysis
This vulnerability stems from improper resource transfer between spheres, classified as CWE-669. In LibreChat 0.8.1-rc2, the authentication mechanism issues JWT tokens that are valid across multiple API boundaries. When a user authenticates to the LibreChat API, they receive a token that is also accepted by the RAG API without proper scope validation.
The core issue is that the JWT tokens are not properly scoped to their intended API context. This means a user authenticated for standard LibreChat operations can present the same token to the RAG API, which may have different authorization requirements or provide access to sensitive retrieval-augmented generation capabilities.
Root Cause
The root cause is improper separation of authentication contexts between the LibreChat API and RAG API components. The shared JWT validation mechanism does not enforce API-specific scope restrictions, allowing tokens issued for one context to be accepted in another. This violates the principle of least privilege and creates unintended access paths to the RAG API functionality.
Attack Vector
The attack requires local access with low privileges (authenticated user). An attacker who has valid credentials for the LibreChat application can:
- Authenticate to the LibreChat API and obtain a JWT token
- Use the same JWT token to make requests to the RAG API
- Access RAG API functionality that may not be intended for the user's authorization level
The vulnerability has a changed scope, meaning successful exploitation can impact resources beyond the vulnerable component itself, potentially affecting confidentiality, integrity, and availability of the RAG API and its associated data.
Detection Methods for CVE-2026-33265
Indicators of Compromise
- Unusual API request patterns where JWT tokens issued for LibreChat API are used against RAG API endpoints
- Increased cross-API authentication attempts from single user sessions
- Access logs showing RAG API requests from users who should only have LibreChat access
Detection Strategies
- Monitor and correlate authentication logs between LibreChat API and RAG API for token reuse patterns
- Implement API gateway logging to detect cross-service authentication anomalies
- Review JWT token claims and validate that tokens are being used within their intended scope
Monitoring Recommendations
- Enable detailed logging on both LibreChat and RAG API authentication endpoints
- Set up alerts for RAG API access from users without explicit RAG permissions
- Audit JWT token issuance and validation configurations for proper scope enforcement
How to Mitigate CVE-2026-33265
Immediate Actions Required
- Upgrade LibreChat to a patched version when available
- Review and restrict user access to RAG API functionality at the network or application level
- Implement additional authorization checks on RAG API endpoints independent of JWT validation
Patch Information
Consult the GitHub Security Advisory for official patch information and updated releases. Additionally, the OpenWall Security Mailing List Post provides further technical discussion of the vulnerability.
Workarounds
- Deploy separate authentication mechanisms for the RAG API that do not share tokens with LibreChat
- Implement network segmentation to restrict RAG API access to only authorized services
- Add middleware validation to check JWT scope claims before allowing RAG API access
- Consider temporarily disabling RAG API functionality until a patch is applied if not business-critical
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


