CVE-2026-31944 - Vulnerability Analysis
HighCVSS: 7.6Last Updated: March 17, 2026
LibreChat - Authentication Bypass
Overview
LibreChat 0.8.2 to 0.8.2-rc3 contains an authentication bypass caused by lack of verification on OAuth callback endpoint, letting attackers perform account takeover of victim's MCP-linked services, exploit requires victim to complete OAuth flow.
Severity & Score
Impact
Attackers can take over victim's linked accounts by storing victim's OAuth tokens on attacker's account.
Mitigation
Update to version 0.8.3-rc1 or later.
Social Media Activity(1 post)
š CVE-2026-31944 - High (7.6) LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Context Protocol) OAuth callback endpoint accepts the redirect from the identity provider and stores OAuth tokens for the user who initiated the flow, w... š https://www.thehackerwire.com/vulnerability/CVE-2026-31944/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-31944
- Severity
- High
- CVSS Score
- 7.6
- Type
- broken_authentication
- Status
- confirmed
- EPSS
- 2.8%
- Social Posts
- 1
CWE
- CWE-306
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N