Chainlit versions prior to 2.9.4 contain an arbitrary...
High severity
Unreviewed
Published
Jan 20, 2026
to the GitHub Advisory Database
•
Updated Jan 20, 2026
Description
Published by the National Vulnerability Database
Jan 20, 2026
Published to the GitHub Advisory Database
Jan 20, 2026
Last updated
Jan 20, 2026
Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/, allowing disclosure of any file readable by the Chainlit service.
References