CVE-2025-68492

Chainlit IDOR: Stealing AI Chat History via Socket.IO

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 15, 2026·5 min read·2 visits

Executive Summary (TL;DR)

Chainlit versions before 2.8.5 trust the client-provided `threadId` during the Socket.IO handshake without verifying ownership. If an attacker guesses or obtains a valid thread UUID, they can impersonate the thread owner, read chat history, and potentially manipulate the conversation state. The fix involves a mandatory ownership check during connection.

A classic Insecure Direct Object Reference (IDOR) vulnerability in Chainlit's Socket.IO connection handling allows authenticated users to hijack chat sessions and view sensitive history by simply supplying another user's thread ID.

Fix Analysis (1)

Technical Appendix

CVSS Score
4.2/ 10
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
EPSS Probability
0.03%
Top 93% most exploited

Affected Systems

Chainlit Framework < 2.8.5

Affected Versions Detail

Product
Affected Versions
Fixed Version
Chainlit
Chainlit
< 2.8.52.8.5
AttributeDetail
CWECWE-639: Authorization Bypass Through User-Controlled Key
CVSS v3.14.2 (Medium)
CVSS v4.02.3 (Low)
Attack VectorNetwork (Socket.IO)
Attack ComplexityHigh (Requires guessing/stealing UUID)
Privileges RequiredLow (Authenticated User)
ImpactConfidentiality & Integrity (Partial)
CWE-639
Insecure Direct Object Reference (IDOR)

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying a key value identifying the data.

Vulnerability Timeline

Fix committed to GitHub
2025-11-07
Version 2.8.5 released
2025-11-08
CVE Published
2026-01-14