Medium severity4.3NVD Advisory· Published May 8, 2026· Updated May 12, 2026
CVE-2026-42276
CVE-2026-42276
Description
Onyx is an open-source AI platform. Prior to versions 3.0.9, 3.1.6, and 3.2.6, the POST /chat/stop-chat-session/{chat_session_id} endpoint lets any authenticated user stop any other user's active chat session. The endpoint checks authentication but never verifies the session belongs to the caller. An attacker who knows a chat session UUID can kill another user's LLM generation mid-stream. This issue has been patched in versions 3.0.9, 3.1.6, and 3.2.6.
Affected products
2- Range: <3.0.9,>=3.1.0,<3.1.6,>=3.2.0,<3.2.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/onyx-dot-app/onyx/security/advisories/GHSA-rw6w-hp62-gc8wnvdExploitVendor Advisory
News mentions
0No linked articles in our index yet.