Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 Jan 2026 03:45:00 +0900


Tue, 20 Jan 2026 17:45:00 +0900

Type Values Removed Values Added
First Time appeared Chainlit
Chainlit chainlit
Vendors & Products Chainlit
Chainlit chainlit

Tue, 20 Jan 2026 08:30:00 +0900

Type Values Removed Values Added
Description Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service.
Title Chainlit < 2.9.4 Arbitrary File Read via /project/element
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-20T18:41:08.734Z

Reserved: 2026-01-06T17:54:14.091Z

Link: CVE-2026-22218

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-20T00:15:48.910

Modified: 2026-01-20T19:15:50.700

Link: CVE-2026-22218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-20T17:40:26Z

Weaknesses