2026-04-08 19:41:23
GitHub_M
PUBLISHED
LightRAG provides simple and fast retrieval-augmented generation. Prior to 1.4.14, the LightRAG API is vulnerable to a JWT algorithm confusion attack where an attacker can forge tokens by specifying alg: none in the JWT header. Since the jwt.decode() call does not explicitly deny the none algorithm, a crafted token without a signature will be accepted as valid, leading to unauthorized access. This vulnerability is fixed in 1.4.14.