<?xml version="1.0" encoding="UTF-8"?>
<VrdaData refvuldefversion="1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://vrda.jpcert.or.jp" xsi:schemaLocation="http://vrda.jpcert.or.jp/feed/xsd/vrda_data.xsd">
  <VrdaDataProvider>
    <Name>JVN iPedia</Name>
    <URL>http://jvndb.jvn.jp</URL>
  </VrdaDataProvider>
  <VrdaDataSourceType>Advisory</VrdaDataSourceType>
  <Vulinfo revisionno="1" lang="ja" invalidated="false">
    <VulinfoID>JVNDB-2026-009101</VulinfoID>
    <VulinfoData>
      <Title>LibreChat&#12395;&#12362;&#12369;&#12427;&#12450;&#12463;&#12475;&#12473;&#21046;&#24481;&#12395;&#38306;&#12377;&#12427;&#33030;&#24369;&#24615;</Title>
      <VulinfoDescription>
        <Overview>LibreChat &#12496;&#12540;&#12472;&#12519;&#12531; 0.8.1-rc2 &#12399;&#12289;&#12518;&#12540;&#12470;&#12540;&#12475;&#12483;&#12471;&#12519;&#12531;&#27231;&#27083;&#12392; RAG API &#12398;&#20001;&#26041;&#12391;&#21516;&#12376; JWT &#12471;&#12540;&#12463;&#12524;&#12483;&#12488;&#12434;&#20351;&#29992;&#12375;&#12390;&#12356;&#12414;&#12377;&#12290;&#12371;&#12428;&#12395;&#12424;&#12426;&#12289;RAG API &#12398;&#12469;&#12540;&#12499;&#12473;&#12524;&#12505;&#12523;&#35469;&#35388;&#12364;&#33030;&#24369;&#12395;&#12394;&#12427;&#21839;&#38988;&#12364;&#12354;&#12426;&#12414;&#12377;&#12290;</Overview>
      </VulinfoDescription>
      <Affected>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:librechat:librechat</Lapt>
        </AffectedItem>
      </Affected>
      <FactAnalysis>
      </FactAnalysis>
      <Related>
        <RelatedItem relationtype="self" origin="jvnipedia">
          <URL>https://jvndb.jvn.jp/ja/contents/2026/JVNDB-2026-009101.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Common Vulnerabilities and Exposures (CVE)</Name>
          <VulinfoID>CVE-2025-41258</VulinfoID>
          <URL>https://www.cve.org/CVERecord?id=CVE-2025-41258</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>National Vulnerability Database (NVD)</Name>
          <VulinfoID>CVE-2025-41258</VulinfoID>
          <URL>https://nvd.nist.gov/vuln/detail/CVE-2025-41258</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>GitHub</Name>
          <VulinfoID>advisories/2025/SBA-ADV-20251205-01_LibreChat_RAG_API_Authentication_Bypass at public  sbaresearch/advisories  GitHub</VulinfoID>
          <URL>https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20251205-01_LibreChat_RAG_API_Authentication_Bypass</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-284</VulinfoID>
          <Title>&#19981;&#36969;&#20999;&#12394;&#12450;&#12463;&#12475;&#12473;&#21046;&#24481;</Title>
          <URL>https://cwe.mitre.org/data/definitions/284.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>GitHub - danny-avila/LibreChat: Enhanced ChatGPT Clone: Features Agents, MCP, DeepSeek, Anthropic, AWS, OpenAI, Responses API, Azure, Groq, o1, GPT-5, Mistral, OpenRouter, Vertex AI, Gemini, Artifacts, AI model switching, message search, Code Interpreter,</VulinfoID>
          <URL>https://github.com/danny-avila/LibreChat</URL>
        </RelatedItem>
      </Related>
      <DateFirstPublished>2026-03-27T16:27:44+09:00</DateFirstPublished>
      <DateLastUpdated>2026-03-27T16:27:44+09:00</DateLastUpdated>
    </VulinfoData>
  </Vulinfo>
</VrdaData>
