Two high-severity vulnerabilities in Chainlit, a preferred open-source framework for constructing conversational AI purposes, permit studying any file on the server and leaking delicate data.
The problems, dubbed ‘ChainLeak’ and found by Zafran Labs researchers, might be exploited with out consumer interplay and affect “internet-facing AI techniques which can be actively deployed throughout a number of industries, together with giant enterprises.”
The Chainlit AI app-building framework has a mean of 700,000 month-to-month downloads on the PyPI registry and 5 million downloads per yr.
It offers a ready-made internet UI for chat-based AI elements, backend plumbing instruments, and built-in assist for authentication, session dealing with, and cloud deployment. It’s usually utilized in enterprise deployments and tutorial establishments, and is present in internet-facing manufacturing techniques.
The 2 safety points that Zafran researchers found are an arbitrary file learn tracked as CVE-2026-22218, and a server-side request forgery (SSRF) tracked as CVE-2026-22219.
CVE-2026-22218 might be exploited by way of the /challenge/ingredient endpoint and permits attackers to submit a customized ingredient with a managed ‘path’ area, forcing Chainlit to repeat the file at that path into the attacker’s session with out validation.
This ends in attackers studying any file accessible to the Chainlit server, together with delicate data similar to API keys, cloud account credentials, supply code, inside configuration recordsdata, SQLite databases, and authentication secrets and techniques.
CVE-2026-22219 impacts Chainlit deployments utilizing the SQLAlchemy knowledge layer, and is exploited by setting the ‘url’ area of a customized ingredient, forcing the server to fetch the URL by way of an outbound GET request and storing the response.
Attackers might then retrieve the fetched knowledge by way of ingredient obtain endpoints, having access to inside REST companies and probing inside IPs and companies, the researchers say.
Zafran demonstrated that the 2 flaws might be mixed right into a single assault chain that permits full-system compromise and lateral motion in cloud environments.
The researchers notified the Chainlit maintainers in regards to the flaws on November 23, 2025, and acquired an acknowledgment on December 9, 2025.
The vulnerabilities had been fastened on December 24, 2025, with the discharge of Chainlit model 2.9.4.
Because of the severity and exploitation potential of CVE-2026-22218 and CVE-2026-22219, impacted organizations are really useful to improve to model 2.9.4 or later (the newest is 2.9.6) as quickly as potential.


