Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-7847— chatchat-space Langchain-Chatchat Uploaded File openai_routes.py _get_file_id random values

CVSS 2.6 · Low EPSS 0.02% · P6
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-7847

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
chatchat-space Langchain-Chatchat Uploaded File openai_routes.py _get_file_id random values
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability was found in chatchat-space Langchain-Chatchat up to 0.3.1.3. The affected element is the function _get_file_id of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component Uploaded File Handler. Performing a manipulation results in insufficiently random values. Access to the local network is required for this attack. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用不充分的随机数
Source: NVD (National Vulnerability Database)
Vulnerability Title
LangChain-Chatchat 加密问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
LangChain-Chatchat是Chatchat-Space开源的一个基于LangChain框架开发的聊天机器人软件。 LangChain-Chatchat 0.3.1.3及之前版本存在加密问题漏洞,该漏洞源于Uploaded File Handler组件中文件libs/chatchat-server/chatchat/server/api_server/openai_routes.py的函数_get_file_id导致随机值不足,可能导致攻击者在本地网络访问下利用该漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
chatchat-spaceLangchain-Chatchat 0.3.1.0 -

II. Public POCs for CVE-2026-7847

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-7847

登录查看更多情报信息。

Same Patch Batch · chatchat-space · 2026-05-05 · 4 CVEs total

CVE-2026-78446.3 MEDIUMchatchat-space Langchain-Chatchat Compatible File Service openai_routes.py delete_file mis
CVE-2026-78462.6 LOWchatchat-space Langchain-Chatchat OpenAI-Compatible File Upload API openai_routes.py files
CVE-2026-78452.6 LOWchatchat-space Langchain-Chatchat Vision Chat Paste Image dialogue.py PIL.Image.tobytes we

IV. Related Vulnerabilities

V. Comments for CVE-2026-7847

No comments yet


Leave a comment