Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wmvv-fhm6-w34x | Langchain-Chatchat Uses a Broken or Risky Cryptographic Algorithm |
Tue, 05 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chatchat-space
Chatchat-space langchain-chatchat |
|
| Vendors & Products |
Chatchat-space
Chatchat-space langchain-chatchat |
|
| Metrics |
ssvc
|
Tue, 05 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in chatchat-space Langchain-Chatchat up to 0.3.1.3. This issue affects the function PIL.Image.tobytes of the file libs/chatchat-server/chatchat/webui_pages/dialogue/dialogue.py of the component Vision Chat Paste Image Handler. This manipulation of the argument paste_image.image_data causes use of weak hash. The attacker needs to be present on the local network. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | chatchat-space Langchain-Chatchat Vision Chat Paste Image dialogue.py PIL.Image.tobytes weak hash | |
| Weaknesses | CWE-327 CWE-328 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-05T19:23:08.834Z
Reserved: 2026-05-05T10:20:53.591Z
Link: CVE-2026-7845
Updated: 2026-05-05T17:48:37.636Z
Status : Deferred
Published: 2026-05-05T16:16:19.383
Modified: 2026-05-05T20:16:41.363
Link: CVE-2026-7845
No data.
OpenCVE Enrichment
Updated: 2026-05-05T18:00:12Z
Github GHSA