Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31944: CWE-306: Missing Authentication for Critical Function in danny-avila LibreChat

0
High
VulnerabilityCVE-2026-31944cvecve-2026-31944cwe-306
Published: Fri Mar 13 2026 (03/13/2026, 19:44:30 UTC)
Source: CVE Database V5
Vendor/Project: danny-avila
Product: LibreChat

Description

LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Context Protocol) OAuth callback endpoint accepts the redirect from the identity provider and stores OAuth tokens for the user who initiated the flow, without verifying that the browser hitting the redirect URL is logged in or that the logged-in user matches the initiator. An attacker can send the authorization URL to a victim; when the victim completes the flow, the victim’s OAuth tokens are stored on the attacker’s LibreChat account, enabling account takeover of the victim’s MCP-linked services (e.g. Atlassian, Outlook). This vulnerability is fixed in 0.8.3-rc1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 00:39:22 UTC

Technical Analysis

CVE-2026-31944 is a critical authentication bypass vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) affecting the LibreChat application, a ChatGPT clone with extended features. The vulnerability resides in the MCP (Model Context Protocol) OAuth callback endpoint in versions from 0.8.2 to 0.8.2-rc3. During the OAuth authorization flow, when a user is redirected back from the identity provider, the endpoint accepts and stores the OAuth tokens without verifying that the browser session completing the redirect is authenticated or corresponds to the user who initiated the OAuth flow. This lack of verification allows an attacker to send a malicious authorization URL to a victim. When the victim completes the OAuth flow, their OAuth tokens are erroneously stored in the attacker’s LibreChat account. Consequently, the attacker gains unauthorized access to the victim’s linked services that rely on MCP OAuth tokens, such as Atlassian and Outlook, effectively enabling account takeover. The vulnerability requires user interaction (the victim must complete the OAuth flow) and privileges are low for the attacker (no prior authentication needed). The issue impacts confidentiality severely, as attackers can access sensitive accounts, with limited impact on integrity and no impact on availability. The vulnerability was publicly disclosed on March 13, 2026, with a CVSS 3.1 score of 7.6, indicating high severity. The issue was resolved in LibreChat version 0.8.3-rc1 by adding proper authentication checks on the OAuth callback endpoint to ensure the session user matches the OAuth flow initiator.

Potential Impact

The primary impact of CVE-2026-31944 is unauthorized account takeover of users’ MCP-linked services, including enterprise-critical platforms like Atlassian and Outlook. This can lead to exposure of sensitive corporate data, unauthorized email access, and potential lateral movement within affected organizations. Since LibreChat is a ChatGPT clone with additional features, organizations using it for AI-assisted workflows that integrate with OAuth-based services are at risk. Attackers can leverage social engineering to trick victims into completing the OAuth flow, making exploitation feasible in targeted phishing campaigns. The compromise of OAuth tokens undermines confidentiality and can facilitate further attacks on corporate infrastructure. The vulnerability does not affect system availability but can severely damage organizational trust and data security. Given the integration with widely used services, the impact spans multiple sectors including technology, finance, government, and education. Organizations relying on LibreChat versions prior to 0.8.3-rc1 should consider their exposure high, especially if OAuth integrations are enabled.

Mitigation Recommendations

Organizations should immediately upgrade LibreChat installations to version 0.8.3-rc1 or later, where the vulnerability is fixed by enforcing authentication and user session verification on the MCP OAuth callback endpoint. Until upgrades are applied, administrators should disable OAuth integrations or restrict access to the OAuth callback endpoint to trusted networks. Implement monitoring for unusual OAuth token storage or authorization flows within LibreChat logs to detect potential exploitation attempts. Educate users about phishing risks involving OAuth authorization URLs and encourage verification of unexpected authorization requests. Employ multi-factor authentication (MFA) on linked services like Atlassian and Outlook to reduce the impact of token compromise. Additionally, review and revoke any suspicious OAuth tokens issued during the vulnerable period. Developers should audit OAuth flows in their applications to ensure strict session and user identity validation on all callback endpoints to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T15:10:10.656Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b4732e2f860ef943a9261d

Added to database: 3/13/2026, 8:27:26 PM

Last enriched: 3/21/2026, 12:39:22 AM

Last updated: 4/28/2026, 7:21:26 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses