Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service.
Metrics
Affected Vendors & Products
References
History
Tue, 20 Jan 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chainlit
Chainlit chainlit |
|
| Vendors & Products |
Chainlit
Chainlit chainlit |
Mon, 19 Jan 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service. | |
| Title | Chainlit < 2.9.4 Arbitrary File Read via /project/element | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-19T23:14:52.969Z
Updated: 2026-01-19T23:14:52.969Z
Reserved: 2026-01-06T17:54:14.091Z
Link: CVE-2026-22218
No data.
Status : Received
Published: 2026-01-20T00:15:48.910
Modified: 2026-01-20T00:15:48.910
Link: CVE-2026-22218
No data.