No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 05 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chatchat-space
Chatchat-space langchain-chatchat |
|
| Vendors & Products |
Chatchat-space
Chatchat-space langchain-chatchat |
Tue, 05 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in chatchat-space Langchain-Chatchat up to 0.3.1.3. The affected element is the function _get_file_id of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component Uploaded File Handler. Performing a manipulation results in insufficiently random values. Access to the local network is required for this attack. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | chatchat-space Langchain-Chatchat Uploaded File openai_routes.py _get_file_id random values | |
| Weaknesses | CWE-310 CWE-330 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-05T16:30:13.695Z
Reserved: 2026-05-05T10:21:00.280Z
Link: CVE-2026-7847
No data.
Status : Deferred
Published: 2026-05-05T17:17:05.153
Modified: 2026-05-05T19:06:58.737
Link: CVE-2026-7847
No data.
OpenCVE Enrichment
Updated: 2026-05-05T20:00:13Z