Impact
A vulnerability in Langchain-Chatchat up to version 0.3.1.3 allows an attacker to delete or retrieve files through the Compatible File Service endpoints in openai_routes.py without any form of authentication. This missing authentication check enables an attacker to remove or access stored data, potentially resulting in data loss, exposure, or service disruption. The issue is specifically present in the files/list_files/retrieve_file/retrieve_file_content/delete_file functions.
Affected Systems
The affected product is Langchain-Chatchat from chatchat-space, versions 0.3.1.3 and earlier. Only installations that expose the openai_routes.py endpoints and are reachable from the local network are vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity vulnerability, while the EPSS score is not provided, suggesting no recent exploitation data is available. The vulnerability is not listed in the CISA KEV catalog. The attack requires local network access and is publicly exploitable; therefore, any host on the same network could use the unprotected endpoints to delete or read files. Given the public availability of the exploit, the risk to affected installations is significant if no mitigation is applied.
OpenCVE Enrichment