Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 02 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:chainlit:chainlit:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 21 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chainlit
Chainlit chainlit |
|
| Vendors & Products |
Chainlit
Chainlit chainlit |
Mon, 19 Jan 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service. | |
| Title | Chainlit < 2.9.4 Arbitrary File Read via /project/element | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:30:19.248Z
Reserved: 2026-01-06T17:54:14.091Z
Link: CVE-2026-22218
Updated: 2026-01-21T19:38:20.547Z
Status : Analyzed
Published: 2026-01-20T00:15:48.910
Modified: 2026-02-02T20:56:44.393
Link: CVE-2026-22218
No data.
OpenCVE Enrichment
Updated: 2026-04-16T18:15:43Z