CVE-2026-7847
Description
A vulnerability was found in chatchat-space Langchain-Chatchat up to 0.3.1.3. The affected element is the function _get_file_id of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component Uploaded File Handler. Performing a manipulation results in insufficiently random values. Access to the local network is required for this attack. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
langchain-chatchatPyPI | <= 0.3.1.3 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-jv4p-mhmp-69vwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-7847ghsaADVISORY
- github.com/3em0/cve_repo/blob/main/Langchain-Chatchat/Vuln-3-Predictable-File-ID.mdnvdWEB
- github.com/chatchat-space/Langchain-Chatchat/issues/5464nvdWEB
- vuldb.com/submit/807796nvdWEB
- vuldb.com/vuln/361126nvdWEB
- vuldb.com/vuln/361126/ctinvdWEB
News mentions
0No linked articles in our index yet.