CVE-2026-7847
LOW
1,2
Source: [email protected]
Attack Vector: adjacent
Attack Complexity: high
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW
2,6
Source: [email protected]
Attack Vector: adjacent_network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
LOW
1,4
Source: [email protected]
Access Vector: adjacent_network
Access Complexity: high
Authentication: single
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
A vulnerability was found in chatchat-space Langchain-Chatchat up to 0.3.1.3. The affected element is the function _get_file_id of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component Uploaded File Handler. Performing a manipulation results in insufficiently random values. Access to the local network is required for this attack. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
330
Use of Insufficiently Random Values
StableCommon Consequences
Security Scopes Affected:
Confidentiality
Other
Access Control
Potential Impacts:
Other
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
https://github.com/3em0/cve_repo/blob/main/Langchain-Chatchat/Vuln-3-Predictabl…
https://github.com/chatchat-space/Langchain-Chatchat/
https://github.com/chatchat-space/Langchain-Chatchat/issues/5464
https://vuldb.com/submit/807796
https://vuldb.com/vuln/361126
https://vuldb.com/vuln/361126/cti