Impact
The vulnerability allows an authenticated client to supply a forged URL in an Element that the server then fetches using an outbound HTTP GET request. The retrieved content is stored via the configured storage provider. This flaw can expose internal network services, cloud metadata endpoints, or other internal resources to an attacker, potentially enabling data exfiltration, internal reconnaissance or further attacks rooted in the data returned from those services.
Affected Systems
Chainlit Chainlit versions earlier than 2.9.4 are affected when using the SQLAlchemy data layer backend. Users running any unsupported release prior to 2.9.4 are at risk if the /project/element update flow is exposed.
Risk and Exploitability
The CVSS score of 8.3 indicates a high severity flaw, but the EPSS score of less than 1% suggests a low probability of exploitation at present. The flaw is not listed in the CISA KEV catalog. An authenticated attacker can use the SSRF path to reach internal resources; the risk is primarily the ability to read or interact with services the application can reach from its environment.
OpenCVE Enrichment
Github GHSA