In danny-avila/librechat version 0.7.9, there is an insecure API design issue in the 2-Factor Authentication (2FA) flow. The system allows users to disable 2FA without requiring a valid OTP or backup code, bypassing the intended verification process. This vulnerability occurs because the backend does not properly validate the OTP or backup code when the API endpoint '/api/auth/2fa/disable' is directly accessed. This flaw can be exploited by authenticated users to weaken the security of their own accounts, although it does not lead to full account compromise.
References
| Link | Resource |
|---|---|
| https://github.com/danny-avila/librechat/commit/7e4c8a5d0d2dbe5bf8fd272ff6acafb27d24744f | Patch |
| https://huntr.com/bounties/8e615709-f4de-41e2-b194-f0d91ed7c75e | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-10-30 20:15
Updated : 2025-11-19 15:27
NVD link : CVE-2025-8850
Mitre link : CVE-2025-8850
CVE.ORG link : CVE-2025-8850
JSON object : View
Products Affected
librechat
- librechat
CWE
CWE-440
Expected Behavior Violation
