Impact
The vulnerability lies in the _get_file_id function within openai_routes.py of the Uploaded File Handler. It generates identifiers using insufficiently random values, creating a weakness tied to improper cryptographic random number generation (CWE-310, CWE-330). As a result, an attacker who can reach the application over the local network could predict or enumerate file identifiers, potentially retrieving sensitive files that should be protected.
Affected Systems
The impacted product is chatchat-space:Langchain-Chatchat, with all releases up to and including version 0.3.1.3 affected. No other vendor or product versions are listed as impacted.
Risk and Exploitability
The overall CVSS score of 2.1 indicates low severity, but the exploit is publicly available and has been described as difficult to execute, requiring high complexity and local network access. The EPSS score is not available, and the vulnerability is not listed in CISA KEV. The likely attack vector is local network compromised, where an attacker can attempt to guess file IDs to access uploaded content.
OpenCVE Enrichment