Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service.
https://thehackernews.com/2026/01/chainlit-ai-framework-flaws-enable-data.html
https://www.theregister.com/2026/01/20/ai_framework_flaws_enterprise_clouds/
https://www.securityweek.com/chainlit-vulnerabilities-may-leak-sensitive-information/
https://www.infosecurity-magazine.com/news/chainlit-security-flaws-ai-apps/
Published: 2026-01-20
Updated: 2026-01-26
Named Vulnerability: ChainLeak
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: High
Base Score: 7.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Severity: High
EPSS: 0.00026