Home

Description

LightRAG provides simple and fast retrieval-augmented generation. Prior to 1.4.14, the LightRAG API is vulnerable to a JWT algorithm confusion attack where an attacker can forge tokens by specifying 'alg': 'none' in the JWT header. Since the jwt.decode() call does not explicitly deny the 'none' algorithm, a crafted token without a signature will be accepted as valid, leading to unauthorized access. This vulnerability is fixed in 1.4.14.

PUBLISHED Reserved 2026-04-07 | Published 2026-04-08 | Updated 2026-04-22 | Assigner GitHub_M




MEDIUM: 4.2CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-347: Improper Verification of Cryptographic Signature

Product status

< 1.4.14
affected

References

github.com/github/advisory-database/issues/7373

github.com/...ghtRAG/security/advisories/GHSA-8ffj-4hx4-9pgf

cve.org (CVE-2026-39413)

nvd.nist.gov (CVE-2026-39413)

Download JSON