icon

We found results for “

CVE-2026-23522

Good to know:

icon
icon

Date: January 19, 2026

LobeChat is an open source chat application platform. Prior to version 2.0.0-next.193, "knowledgeBase.removeFilesFromKnowledgeBase" tRPC ep allows authenticated users to delete files from any knowledge base without verifying ownership. "userId" filter in the database query is commented out, so it's enabling attackers to delete other users' KB files if they know the knowledge base ID and file ID. While the vulnerability is confirmed, practical exploitation requires knowing target's KB ID and target's file ID. These IDs are random and not easily enumerable. However, IDs may leak through shared links, logs, referrer headers and so on. Missing authorization check is a critical security flaw regardless. Users should upgrade to version 2.0.0-next.193 to receive a patch.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Access Control

CWE-284

Missing Authorization

CWE-862

Authorization Bypass Through User-Controlled Key

CWE-639

Improperly Controlled Modification of Dynamically-Determined Object Attributes

CWE-915

Top Fix

icon

Upgrade Version

Upgrade to version https://github.com/lobehub/lobe-chat.git - v2.0.0-next.193;https://github.com/lobehub/lobe-chat.git - v1.147.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us