Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-7846— chatchat-space Langchain-Chatchat OpenAI-Compatible File Upload API openai_routes.py files toctou

CVSS 2.6 · Low EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-7846

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
chatchat-space Langchain-Chatchat OpenAI-Compatible File Upload API openai_routes.py files toctou
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been found in chatchat-space Langchain-Chatchat up to 0.3.1.3. Impacted is the function files of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component OpenAI-Compatible File Upload API. Such manipulation of the argument file.filename leads to time-of-check time-of-use. Access to the local network is required for this attack to succeed. The attack requires a high level of complexity. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
检查时间与使用时间(TOCTOU)的竞争条件
Source: NVD (National Vulnerability Database)
Vulnerability Title
LangChain-Chatchat 竞争条件问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
LangChain-Chatchat是Chatchat-Space开源的一个基于LangChain框架开发的聊天机器人软件。 Langchain-Chatchat 0.3.1.3及之前版本存在竞争条件问题漏洞,该漏洞源于OpenAI-Compatible File Upload API组件中文件libs/chatchat-server/chatchat/server/api_server/openai_routes.py的函数files对参数file.filename的操作导致检查时间与使用时间问题,可能
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
chatchat-spaceLangchain-Chatchat 0.3.1.0 -

II. Public POCs for CVE-2026-7846

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-7846

登录查看更多情报信息。

Same Patch Batch · chatchat-space · 2026-05-05 · 4 CVEs total

CVE-2026-78446.3 MEDIUMchatchat-space Langchain-Chatchat Compatible File Service openai_routes.py delete_file mis
CVE-2026-78452.6 LOWchatchat-space Langchain-Chatchat Vision Chat Paste Image dialogue.py PIL.Image.tobytes we
CVE-2026-78472.6 LOWchatchat-space Langchain-Chatchat Uploaded File openai_routes.py _get_file_id random value

IV. Related Vulnerabilities

V. Comments for CVE-2026-7846

No comments yet


Leave a comment