Description
LobeChat is an open source chat application platform. Prior to version 2.0.0-next.180, a stored Cross-Site Scripting (XSS) vulnerability in the Mermaid artifact renderer allows attackers to execute arbitrary JavaScript within the application context. This XSS can be escalated to Remote Code Execution (RCE) by leveraging the exposed `electronAPI` IPC bridge, allowing attackers to run arbitrary system commands on the victim's machine. Version 2.0.0-next.180 patches the issue.
Published: 2026-01-18
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

LobeChat, an open source chat platform, contains a stored Cross‑Site Scripting flaw in its Mermaid artifact renderer. The flaw permits an attacker to inject arbitrary JavaScript into the application. When this XSS is combined with the vulnerability in the exposed electronAPI inter‑process communication bridge, an attacker can elevate the injected code to execute arbitrary system commands, thereby achieving remote code execution on the victim’s machine.

Affected Systems

The issue affects all versions of the LobeChat application prior to 2.0.0‑next.180. Users running the affected builds from any distribution that includes the vulnerable Mermaid renderer are at risk.

Risk and Exploitability

The CVSS base score of 6.4 indicates a moderate to high impact, while the EPSS score of less than 1% suggests a low probability of current exploitation. The vulnerability is not yet cataloged in the CISA KEV list, but the combination of client‑side XSS with IPC‑based command execution grants a powerful attack vector, especially in environments where the Electron API is widely accessible. An attacker would need to convince a user to open a malicious artifact or otherwise inject the payload into the renderer; once done, the IPC bridge can be exploited to run system commands.

Generated by OpenCVE AI on April 18, 2026 at 05:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LobeChat to version 2.0.0‑next.180 or newer, which removes the vulnerable renderer and disables the exposed IPC bridge used for command execution.
  • If an immediate upgrade cannot be performed, isolate the application by running it within a sandboxed or restricted container that blocks access to system-level APIs and the electronAPI IPC bridge.
  • Implement strict input validation on all user‑supplied artifacts before rendering, ensuring that any embedded scripts are either stripped or sanitized to prevent execution of injected JavaScript.

Generated by OpenCVE AI on April 18, 2026 at 05:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4gpc-rhpj-9443 Lobe Chat affected by Cross-Site Scripting(XSS) that can escalate to Remote Code Execution(RCE)
History

Tue, 20 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Lobehub
Lobehub lobe Chat
Vendors & Products Lobehub
Lobehub lobe Chat

Sun, 18 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Description LobeChat is an open source chat application platform. Prior to version 2.0.0-next.180, a stored Cross-Site Scripting (XSS) vulnerability in the Mermaid artifact renderer allows attackers to execute arbitrary JavaScript within the application context. This XSS can be escalated to Remote Code Execution (RCE) by leveraging the exposed `electronAPI` IPC bridge, allowing attackers to run arbitrary system commands on the victim's machine. Version 2.0.0-next.180 patches the issue.
Title Lobe Chat has Cross-Site Scripting (XSS) issue that may escalate to Remote Code Execution (RCE)
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L'}


Subscriptions

Lobehub Lobe Chat
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-20T20:06:51.723Z

Reserved: 2026-01-15T15:45:01.957Z

Link: CVE-2026-23733

cve-icon Vulnrichment

Updated: 2026-01-20T19:37:29.497Z

cve-icon NVD

Status : Deferred

Published: 2026-01-18T23:15:48.710

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23733

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses