In danny-avila/librechat version 0.7.9, there is an insecure API design issue in the 2-Factor Authentication (2FA) flow. The system allows users to disable 2FA without requiring a valid OTP or backup code, bypassing the intended verification process. This vulnerability occurs because the backend does not properly validate the OTP or backup code when the API endpoint '/api/auth/2fa/disable' is directly accessed. This flaw can be exploited by authenticated users to weaken the security of their own accounts, although it does not lead to full account compromise.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/librechat/commit/7e4c8a5d0d2dbe5bf8fd272ff6acafb27d24744f | Patch |
| https://huntr.com/bounties/8e615709-f4de-41e2-b194-f0d91ed7c75e | Third Party Advisory Exploit Patch |
Configurations
History
19 Nov 2025, 15:27
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Librechat
Librechat librechat |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| References | () https://github.com/danny-avila/librechat/commit/7e4c8a5d0d2dbe5bf8fd272ff6acafb27d24744f - Patch | |
| References | () https://huntr.com/bounties/8e615709-f4de-41e2-b194-f0d91ed7c75e - Third Party Advisory, Exploit, Patch | |
| CPE | cpe:2.3:a:librechat:librechat:0.7.9:-:*:*:*:*:*:* |
04 Nov 2025, 15:41
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-30 20:15
Updated : 2025-11-19 15:27
NVD link : CVE-2025-8850
Mitre link : CVE-2025-8850
CVE.ORG link : CVE-2025-8850
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-440
Expected Behavior Violation
