Description
A flaw has been found in chatchat-space Langchain-Chatchat up to 0.3.1.3. This issue affects the function PIL.Image.tobytes of the file libs/chatchat-server/chatchat/webui_pages/dialogue/dialogue.py of the component Vision Chat Paste Image Handler. This manipulation of the argument paste_image.image_data causes use of weak hash. The attacker needs to be present on the local network. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-05
Score: 2.1 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw exists in the Vision Chat Paste Image Handler of chatchat-space's Langchain‑Chatchat v0.3.1.3 and earlier, where the function PIL.Image.tobytes is called with untrusted paste_image.image_data and uses a weak hash algorithm, thereby enabling an adversary to generate hash collisions in the image data handling. This weakness can allow attackers to craft inputs that bypass integrity checks, potentially leading to tampering or spoofing of pasted images. While no direct exploitation of arbitrary code execution is described, the use of weak cryptographic primitives poses a risk to data integrity within the chat application.

Affected Systems

The vulnerability affects all deployments of chatchat-space's Langchain‑Chatchat up to and including version 0.3.1.3, specifically the component located in libs/chatchat-server/chatchat/webui_pages/dialogue/dialogue.py. Users running this product on their local networks without an available patch are exposed.

Risk and Exploitability

With a CVSS score of 2.1 the severity is low, but the vulnerability has been published and the exploit is considered difficult to achieve. The attacker must be present on the local network and the attack requires high complexity. The EPSS score is not available and the issue is not listed in CISA's KEV catalog, suggesting limited current exploitation, yet the low severity does not reduce the need for vigilance in environments where image integrity is critical.

Generated by OpenCVE AI on May 5, 2026 at 17:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Monitor the chatchat-space repository for an official update that addresses the weak hash issue and apply the patch as soon as it becomes available.
  • Restrict local network access to the Vision Chat Paste Image handler via firewall rules or network segmentation, ensuring that only trusted hosts can communicate with the server.
  • Replace the weak hash mechanism with a strong cryptographic hash algorithm (e.g., SHA‑256) in the code path that handles pasted images, or disable the image paste feature until a secure implementation is provided.

Generated by OpenCVE AI on May 5, 2026 at 17:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Chatchat-space
Chatchat-space langchain-chatchat
Vendors & Products Chatchat-space
Chatchat-space langchain-chatchat
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 05 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in chatchat-space Langchain-Chatchat up to 0.3.1.3. This issue affects the function PIL.Image.tobytes of the file libs/chatchat-server/chatchat/webui_pages/dialogue/dialogue.py of the component Vision Chat Paste Image Handler. This manipulation of the argument paste_image.image_data causes use of weak hash. The attacker needs to be present on the local network. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title chatchat-space Langchain-Chatchat Vision Chat Paste Image dialogue.py PIL.Image.tobytes weak hash
Weaknesses CWE-327
CWE-328
References
Metrics cvssV2_0

{'score': 1.4, 'vector': 'AV:A/AC:H/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.6, 'vector': 'CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.6, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Chatchat-space Langchain-chatchat
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-05T19:23:08.834Z

Reserved: 2026-05-05T10:20:53.591Z

Link: CVE-2026-7845

cve-icon Vulnrichment

Updated: 2026-05-05T17:48:37.636Z

cve-icon NVD

Status : Deferred

Published: 2026-05-05T16:16:19.383

Modified: 2026-05-05T20:16:41.363

Link: CVE-2026-7845

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T18:00:12Z

Weaknesses