Description
Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service.
INFO
Published Date :
2026-01-19T23:14:52.969Z
Last Modified :
2026-03-05T01:30:19.248Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-22218 vulnerability.
| Vendors | Products |
|---|---|
| Chainlit |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-22218.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact