Description
A vulnerability was detected in lm-sys fastchat up to 0.2.36. Impacted is the function add_text of the component Arena Side-by-Side View Handler. The manipulation results in incorrect control flow. The attack can be launched remotely. The exploit is now public and may be used. The root cause was fixed in commit 34eca62 for gradio_block_arena_named.py, but three other files were missed.
Published: 2026-04-20
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: Remote control‑flow manipulation leading to potential unintended execution
Action: Immediate Patch
AI Analysis

Impact

The flaw resides in the add_text function of the Arena Side‑by‑Side View handler in FastChat. An attacker can manipulate input to cause the function to alter the normal control flow, producing an unintended sequence of operations. The vulnerability is identified as CWE‑670, indicating an incorrect or missing return value that can change the logic of the application. Because the defect propagates through remote API calls, an attacker can trigger the miscontrol flow from outside the host without local privileges. The remote nature and public availability of exploit code elevate the risk for any installation running a version of FastChat before 0.2.37.

Affected Systems

FastChat, a conversational‑AI framework maintained by lm‑sys, is affected in all releases up to and including 0.2.36. Versions beyond 0.2.36 are presumed to incorporate the fix in commit 34eca62, but availability of a comprehensive patch that addresses all missed files has yet to be confirmed.

Risk and Exploitability

The CVSS score of 6.9 places the bug in the moderately severe range, yet its exploitation can have serious consequences because a misdirected control flow can lead to unauthorized operations within the application. With no EPSS score available, the exact likelihood of exploitation in the wild cannot be quantified, but the public release of exploit code means attackers have ready tools to target vulnerable deployments. Furthermore, the fault remains unpatched in three previously overlooked files, so a complete fix has not been rolled out. The combination of remote attack vector, public exploit, and incomplete patching makes this vulnerability a significant risk for entities running older FastChat instances.

Generated by OpenCVE AI on April 20, 2026 at 07:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the official update that includes commit 34eca62 and all additional changes to the remaining affected files.
  • If a patch is not yet released, disable the Arena Side‑by‑Side View functionality or restrict remote access to the add_text endpoint to prevent exploitation.
  • Continuously supervise application logs for anomalous control‑flow patterns and block or quarantine any suspicious inbound requests targeting the FastChat service.

Generated by OpenCVE AI on April 20, 2026 at 07:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in lm-sys fastchat up to 0.2.36. Impacted is the function add_text of the component Arena Side-by-Side View Handler. The manipulation results in incorrect control flow. The attack can be launched remotely. The exploit is now public and may be used. The root cause was fixed in commit 34eca62 for gradio_block_arena_named.py, but three other files were missed.
Title lm-sys fastchat Arena Side-by-Side View add_text control flow
First Time appeared Lm-sys
Lm-sys fastchat
Weaknesses CWE-670
CPEs cpe:2.3:a:lm-sys:fastchat:*:*:*:*:*:*:*:*
Vendors & Products Lm-sys
Lm-sys fastchat
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T05:15:12.337Z

Reserved: 2026-04-19T15:59:43.122Z

Link: CVE-2026-6608

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-20T06:16:21.733

Modified: 2026-04-20T06:16:21.733

Link: CVE-2026-6608

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T08:00:09Z

Weaknesses