CVE-2026-39413
EUVD-2026-2060108.04.2026, 20:16
LightRAG provides simple and fast retrieval-augmented generation. Prior to 1.4.14, the LightRAG API is vulnerable to a JWT algorithm confusion attack where an attacker can forge tokens by specifying 'alg': 'none' in the JWT header. Since the jwt.decode() call does not explicitly deny the 'none' algorithm, a crafted token without a signature will be accepted as valid, leading to unauthorized access. This vulnerability is fixed in 1.4.14.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| hkuds | lightrag | 𝑥 < 1.4.14 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration