CVE-2026-31944: CWE-306: Missing Authentication for Critical Function in danny-avila LibreChat
LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Context Protocol) OAuth callback endpoint accepts the redirect from the identity provider and stores OAuth tokens for the user who initiated the flow, without verifying that the browser hitting the redirect URL is logged in or that the logged-in user matches the initiator. An attacker can send the authorization URL to a victim; when the victim completes the flow, the victim’s OAuth tokens are stored on the attacker’s LibreChat account, enabling account takeover of the victim’s MCP-linked services (e.g. Atlassian, Outlook). This vulnerability is fixed in 0.8.3-rc1.
AI Analysis
Technical Summary
CVE-2026-31944 is a critical authentication bypass vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) affecting the LibreChat application, a ChatGPT clone with extended features. The vulnerability resides in the MCP (Model Context Protocol) OAuth callback endpoint in versions from 0.8.2 to 0.8.2-rc3. During the OAuth authorization flow, when a user is redirected back from the identity provider, the endpoint accepts and stores the OAuth tokens without verifying that the browser session completing the redirect is authenticated or corresponds to the user who initiated the OAuth flow. This lack of verification allows an attacker to send a malicious authorization URL to a victim. When the victim completes the OAuth flow, their OAuth tokens are erroneously stored in the attacker’s LibreChat account. Consequently, the attacker gains unauthorized access to the victim’s linked services that rely on MCP OAuth tokens, such as Atlassian and Outlook, effectively enabling account takeover. The vulnerability requires user interaction (the victim must complete the OAuth flow) and privileges are low for the attacker (no prior authentication needed). The issue impacts confidentiality severely, as attackers can access sensitive accounts, with limited impact on integrity and no impact on availability. The vulnerability was publicly disclosed on March 13, 2026, with a CVSS 3.1 score of 7.6, indicating high severity. The issue was resolved in LibreChat version 0.8.3-rc1 by adding proper authentication checks on the OAuth callback endpoint to ensure the session user matches the OAuth flow initiator.
Potential Impact
The primary impact of CVE-2026-31944 is unauthorized account takeover of users’ MCP-linked services, including enterprise-critical platforms like Atlassian and Outlook. This can lead to exposure of sensitive corporate data, unauthorized email access, and potential lateral movement within affected organizations. Since LibreChat is a ChatGPT clone with additional features, organizations using it for AI-assisted workflows that integrate with OAuth-based services are at risk. Attackers can leverage social engineering to trick victims into completing the OAuth flow, making exploitation feasible in targeted phishing campaigns. The compromise of OAuth tokens undermines confidentiality and can facilitate further attacks on corporate infrastructure. The vulnerability does not affect system availability but can severely damage organizational trust and data security. Given the integration with widely used services, the impact spans multiple sectors including technology, finance, government, and education. Organizations relying on LibreChat versions prior to 0.8.3-rc1 should consider their exposure high, especially if OAuth integrations are enabled.
Mitigation Recommendations
Organizations should immediately upgrade LibreChat installations to version 0.8.3-rc1 or later, where the vulnerability is fixed by enforcing authentication and user session verification on the MCP OAuth callback endpoint. Until upgrades are applied, administrators should disable OAuth integrations or restrict access to the OAuth callback endpoint to trusted networks. Implement monitoring for unusual OAuth token storage or authorization flows within LibreChat logs to detect potential exploitation attempts. Educate users about phishing risks involving OAuth authorization URLs and encourage verification of unexpected authorization requests. Employ multi-factor authentication (MFA) on linked services like Atlassian and Outlook to reduce the impact of token compromise. Additionally, review and revoke any suspicious OAuth tokens issued during the vulnerable period. Developers should audit OAuth flows in their applications to ensure strict session and user identity validation on all callback endpoints to prevent similar vulnerabilities.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Japan, South Korea, India, Netherlands, Sweden, Switzerland, Singapore
CVE-2026-31944: CWE-306: Missing Authentication for Critical Function in danny-avila LibreChat
Description
LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Context Protocol) OAuth callback endpoint accepts the redirect from the identity provider and stores OAuth tokens for the user who initiated the flow, without verifying that the browser hitting the redirect URL is logged in or that the logged-in user matches the initiator. An attacker can send the authorization URL to a victim; when the victim completes the flow, the victim’s OAuth tokens are stored on the attacker’s LibreChat account, enabling account takeover of the victim’s MCP-linked services (e.g. Atlassian, Outlook). This vulnerability is fixed in 0.8.3-rc1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-31944 is a critical authentication bypass vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) affecting the LibreChat application, a ChatGPT clone with extended features. The vulnerability resides in the MCP (Model Context Protocol) OAuth callback endpoint in versions from 0.8.2 to 0.8.2-rc3. During the OAuth authorization flow, when a user is redirected back from the identity provider, the endpoint accepts and stores the OAuth tokens without verifying that the browser session completing the redirect is authenticated or corresponds to the user who initiated the OAuth flow. This lack of verification allows an attacker to send a malicious authorization URL to a victim. When the victim completes the OAuth flow, their OAuth tokens are erroneously stored in the attacker’s LibreChat account. Consequently, the attacker gains unauthorized access to the victim’s linked services that rely on MCP OAuth tokens, such as Atlassian and Outlook, effectively enabling account takeover. The vulnerability requires user interaction (the victim must complete the OAuth flow) and privileges are low for the attacker (no prior authentication needed). The issue impacts confidentiality severely, as attackers can access sensitive accounts, with limited impact on integrity and no impact on availability. The vulnerability was publicly disclosed on March 13, 2026, with a CVSS 3.1 score of 7.6, indicating high severity. The issue was resolved in LibreChat version 0.8.3-rc1 by adding proper authentication checks on the OAuth callback endpoint to ensure the session user matches the OAuth flow initiator.
Potential Impact
The primary impact of CVE-2026-31944 is unauthorized account takeover of users’ MCP-linked services, including enterprise-critical platforms like Atlassian and Outlook. This can lead to exposure of sensitive corporate data, unauthorized email access, and potential lateral movement within affected organizations. Since LibreChat is a ChatGPT clone with additional features, organizations using it for AI-assisted workflows that integrate with OAuth-based services are at risk. Attackers can leverage social engineering to trick victims into completing the OAuth flow, making exploitation feasible in targeted phishing campaigns. The compromise of OAuth tokens undermines confidentiality and can facilitate further attacks on corporate infrastructure. The vulnerability does not affect system availability but can severely damage organizational trust and data security. Given the integration with widely used services, the impact spans multiple sectors including technology, finance, government, and education. Organizations relying on LibreChat versions prior to 0.8.3-rc1 should consider their exposure high, especially if OAuth integrations are enabled.
Mitigation Recommendations
Organizations should immediately upgrade LibreChat installations to version 0.8.3-rc1 or later, where the vulnerability is fixed by enforcing authentication and user session verification on the MCP OAuth callback endpoint. Until upgrades are applied, administrators should disable OAuth integrations or restrict access to the OAuth callback endpoint to trusted networks. Implement monitoring for unusual OAuth token storage or authorization flows within LibreChat logs to detect potential exploitation attempts. Educate users about phishing risks involving OAuth authorization URLs and encourage verification of unexpected authorization requests. Employ multi-factor authentication (MFA) on linked services like Atlassian and Outlook to reduce the impact of token compromise. Additionally, review and revoke any suspicious OAuth tokens issued during the vulnerable period. Developers should audit OAuth flows in their applications to ensure strict session and user identity validation on all callback endpoints to prevent similar vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-10T15:10:10.656Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b4732e2f860ef943a9261d
Added to database: 3/13/2026, 8:27:26 PM
Last enriched: 3/21/2026, 12:39:22 AM
Last updated: 4/28/2026, 7:21:26 AM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.