🔐 CVE Alert

CVE-2026-22218

UNKNOWN 0.0

Chainlit < 2.9.4 Arbitrary File Read via /project/element

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey>, allowing disclosure of any file readable by the Chainlit service.

CWE CWE-22
Vendor chainlit
Product chainlit
Published Jan 19, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for chainlit chainlit

Be the first to know when new unknown vulnerabilities affecting chainlit chainlit are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Chainlit / Chainlit
0 < 2.9.4

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/Chainlit/chainlit/releases/tag/2.9.4 zafran.io: https://www.zafran.io/resources/chainleak-critical-ai-framework-vulnerabilities-expose-data-enable-cloud-takeover vulncheck.com: https://www.vulncheck.com/advisories/chainlit-arbitrary-file-read-via-project-element

Credits

Ido Shani and Gal Zaban of Zafran Security