Impact
LobeChat, an open source chat platform, contains a stored Cross‑Site Scripting flaw in its Mermaid artifact renderer. The flaw permits an attacker to inject arbitrary JavaScript into the application. When this XSS is combined with the vulnerability in the exposed electronAPI inter‑process communication bridge, an attacker can elevate the injected code to execute arbitrary system commands, thereby achieving remote code execution on the victim’s machine.
Affected Systems
The issue affects all versions of the LobeChat application prior to 2.0.0‑next.180. Users running the affected builds from any distribution that includes the vulnerable Mermaid renderer are at risk.
Risk and Exploitability
The CVSS base score of 6.4 indicates a moderate to high impact, while the EPSS score of less than 1% suggests a low probability of current exploitation. The vulnerability is not yet cataloged in the CISA KEV list, but the combination of client‑side XSS with IPC‑based command execution grants a powerful attack vector, especially in environments where the Electron API is widely accessible. An attacker would need to convince a user to open a malicious artifact or otherwise inject the payload into the renderer; once done, the IPC bridge can be exploited to run system commands.
OpenCVE Enrichment
Github GHSA