Ad

CVE-2026-31951

MEDIUM CVSS 3.1: 5.7 EPSS 0.03%
Updated Mar 30, 2026
Librechat
Parameter Value
CVSS 5.7 (MEDIUM)
Affected Versions 0.8.2 — 0.8.3
Fixed In 0.8.3
Type CWE-200 (Information Exposure)
Vendor Librechat
Public PoC No

LibreChat is a ChatGPT clone with additional features. In versions 0.8.2-rc1 through 0.8.3-rc1, user-created MCP (Model Context Protocol) servers can include arbitrary HTTP headers that undergo credential placeholder substitution. An attacker can create a malicious MCP server with headers containing `{{LIBRECHAT_OPENID_ACCESS_TOKEN}}` (and others), causing victims who call tools on that server to have their OAuth tokens exfiltrated.

Version 0.8.3-rc2 fixes the issue.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 2

Configuration From (including) Up to (excluding)
Librechat Librechat
cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*
0.8.2 0.8.3
Librechat Librechat
cpe:2.3:a:librechat:librechat:0.8.3:rc1:*:*:*:*:*:*