Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v492-6xx2-p57g | Chainlit contains an authorization bypass vulnerability |
Thu, 15 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Jan 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chainlit
Chainlit chainlit |
|
| Vendors & Products |
Chainlit
Chainlit chainlit |
Wed, 14 Jan 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chainlit versions prior to 2.8.5 contain an authorization bypass through user-controlled key vulnerability. If this vulnerability is exploited, threads may be viewed or thread ownership may be obtained by an attacker who can log in to the product. | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-01-15T17:24:34.226Z
Reserved: 2025-12-19T04:48:45.762Z
Link: CVE-2025-68492
Updated: 2026-01-15T17:24:29.464Z
Status : Deferred
Published: 2026-01-14T07:16:14.627
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-68492
No data.
OpenCVE Enrichment
Updated: 2026-01-15T08:03:56Z
Github GHSA