Medium severity6.5NVD Advisory· Published May 8, 2026· Updated May 12, 2026
CVE-2026-42277
CVE-2026-42277
Description
Onyx is an open-source AI platform. Prior to versions 3.0.9, 3.1.6, and 3.2.6, the GET /chat/file/{file_id} endpoint allows any authenticated user to download any other user's uploaded files by providing the file UUID. The endpoint verifies the caller is authenticated but never checks that the file belongs to them. An attacker who knows or obtains a file UUID can access confidential documents, chat attachments, and other files uploaded by any user in the system. This issue has been patched in versions 3.0.9, 3.1.6, and 3.2.6.
Affected products
1- Range: <3.0.9, >=3.1.0,<3.1.6, >=3.2.0,<3.2.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/onyx-dot-app/onyx/security/advisories/GHSA-vg3h-35f7-7w6rnvdVendor Advisory
News mentions
0No linked articles in our index yet.