Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 19 Jan 2026 23:30:00 +0000

Type Values Removed Values Added
Description Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service.
Title Chainlit < 2.9.4 Arbitrary File Read via /project/element
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-19T23:14:52.969Z

Reserved: 2026-01-06T17:54:14.091Z

Link: CVE-2026-22218

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-20T00:15:48.910

Modified: 2026-01-20T00:15:48.910

Link: CVE-2026-22218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses