CVE-2026-22218

Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chainlit:chainlit:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-20 00:15

Updated : 2026-02-02 20:56


NVD link : CVE-2026-22218

Mitre link : CVE-2026-22218

CVE.ORG link : CVE-2026-22218


JSON object : View

Products Affected

chainlit

  • chainlit
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')