CVE-2026-23842

ChatterBot Silence: Killing AI with Database Exhaustion

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 20, 2026·5 min read·1 visit

Executive Summary (TL;DR)

ChatterBot versions <= 1.2.10 fail to release database connections after processing requests. An attacker can trigger a denial of service (DoS) simply by sending concurrent requests, causing the SQL connection pool to fill up and blocking all subsequent traffic until the service is manually restarted.

ChatterBot, a popular Python library for conversational AI, suffers from a critical resource mismanagement flaw in its SQL storage adapter. By failing to close database sessions and properly scope threads, the application leaks connections until the database pool is exhausted, resulting in a persistent Denial of Service.

Fix Analysis (1)

Technical Appendix

CVSS Score
7.5/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Probability
0.04%
Top 86% most exploited

Affected Systems

ChatterBot <= 1.2.10Applications using ChatterBot with SQLStorageAdapter

Affected Versions Detail

Product
Affected Versions
Fixed Version
ChatterBot
GuntherCox
<= 1.2.101.2.11
AttributeDetail
CWECWE-400 (Uncontrolled Resource Consumption)
CVSS v3.17.5 (High)
Attack VectorNetwork (Remote)
Attack ComplexityLow
Privileges RequiredNone
ImpactDenial of Service (Persistent)
Fixed Version1.2.11
CWE-400
Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

Vulnerability Timeline

Fix commit pushed and v1.2.11 released
2026-01-17
CVE-2026-23842 published
2026-01-19
GHSA-v4w8-49pv-mf72 advisory released
2026-01-19