Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2g59-m95p-pgfq

Опубликовано: 20 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 8.3
CVSS3: 7.7

Описание

Chainlit contain a server-side request forgery (SSRF) vulnerability

Chainlit versions prior to 2.9.4 contain a server-side request forgery (SSRF) vulnerability in the /project/element update flow when configured with the SQLAlchemy data layer backend. An authenticated client can provide a user-controlled url value in an Element, which is fetched by the SQLAlchemy element creation logic using an outbound HTTP GET request. This allows an attacker to make arbitrary HTTP requests from the Chainlit server to internal network services or cloud metadata endpoints and store the retrieved responses via the configured storage provider.

Пакеты

Наименование

chainlit

pip
Затронутые версииВерсия исправления

< 2.9.4

2.9.4

EPSS

Процентиль: 9%
0.00031
Низкий

8.3 High

CVSS4

7.7 High

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 7.7
nvd
18 дней назад

Chainlit versions prior to 2.9.4 contain a server-side request forgery (SSRF) vulnerability in the /project/element update flow when configured with the SQLAlchemy data layer backend. An authenticated client can provide a user-controlled url value in an Element, which is fetched by the SQLAlchemy element creation logic using an outbound HTTP GET request. This allows an attacker to make arbitrary HTTP requests from the Chainlit server to internal network services or cloud metadata endpoints and store the retrieved responses via the configured storage provider.

EPSS

Процентиль: 9%
0.00031
Низкий

8.3 High

CVSS4

7.7 High

CVSS3

Дефекты

CWE-918