CVE-2026-7847

Published: Mag 05, 2026 Last Modified: Mag 05, 2026
ExploitDB:
Other exploit source:
Google Dorks:
LOW 1,2
Attack Vector: adjacent
Attack Complexity: high
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW 2,6
Attack Vector: adjacent_network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
LOW 1,4
Access Vector: adjacent_network
Access Complexity: high
Authentication: single
Confidentiality: partial
Integrity: none
Availability: none

Description

AI Translation Available

A vulnerability was found in chatchat-space Langchain-Chatchat up to 0.3.1.3. The affected element is the function _get_file_id of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component Uploaded File Handler. Performing a manipulation results in insufficiently random values. Access to the local network is required for this attack. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

330

Use of Insufficiently Random Values

Stable
Common Consequences
Security Scopes Affected:
Confidentiality Other Access Control
Potential Impacts:
Other Bypass Protection Mechanism Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
View CWE Details
https://github.com/3em0/cve_repo/blob/main/Langchain-Chatchat/Vuln-3-Predictabl…
https://github.com/chatchat-space/Langchain-Chatchat/
https://github.com/chatchat-space/Langchain-Chatchat/issues/5464
https://vuldb.com/submit/807796
https://vuldb.com/vuln/361126
https://vuldb.com/vuln/361126/cti