We found results for “”
CVE-2026-23522
Good to know:
Date: January 19, 2026
LobeChat is an open source chat application platform. Prior to version 2.0.0-next.193, "knowledgeBase.removeFilesFromKnowledgeBase" tRPC ep allows authenticated users to delete files from any knowledge base without verifying ownership. "userId" filter in the database query is commented out, so it's enabling attackers to delete other users' KB files if they know the knowledge base ID and file ID. While the vulnerability is confirmed, practical exploitation requires knowing target's KB ID and target's file ID. These IDs are random and not easily enumerable. However, IDs may leak through shared links, logs, referrer headers and so on. Missing authorization check is a critical security flaw regardless. Users should upgrade to version 2.0.0-next.193 to receive a patch.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version https://github.com/lobehub/lobe-chat.git - v2.0.0-next.193;https://github.com/lobehub/lobe-chat.git - v1.147.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


