CVE-2026-7847

LOW

chatchat-space Langchain-Chatchat Uploaded File openai_routes.py _get_file_id random values

Title source: cna
STIX 2.1

Description

A vulnerability was found in chatchat-space Langchain-Chatchat up to 0.3.1.3. The affected element is the function _get_file_id of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component Uploaded File Handler. Performing a manipulation results in insufficiently random values. Access to the local network is required for this attack. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

References (6)

Core 6
Core References
Vdb Entry, Technical Description vdb-entry technical-description
VDB-361126 | chatchat-space Langchain-Chatchat Uploaded File openai_routes.py _get_file_id random values
https://vuldb.com/vuln/361126
Signature, Permissions Required signature permissions-required
VDB-361126 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/vuln/361126/cti
Third Party Advisory third-party-advisory
Submit #807796 | chatchat-space Langchain-Chatchat 0.3.1.3 Use of Insufficiently Random Values / CWE-330
https://vuldb.com/submit/807796

Scores

CVSS v3 2.6
EPSS 0.0002
EPSS Percentile 6.2%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-310 CWE-330
Status published
Products (5)
chatchat-space/Langchain-Chatchat 0.3.1.0
chatchat-space/Langchain-Chatchat 0.3.1.1
chatchat-space/Langchain-Chatchat 0.3.1.2
chatchat-space/Langchain-Chatchat 0.3.1.3
pypi/langchain-chatchat 0 - 0.3.1.3PyPI
Published May 05, 2026
Tracked Since May 05, 2026