CVE-2026-7845 PUBLISHED

chatchat-space Langchain-Chatchat Vision Chat Paste Image dialogue.py PIL.Image.tobytes weak hash

Assigner: VulDB
Reserved: 05.05.2026 Published: 05.05.2026 Updated: 05.05.2026

A flaw has been found in chatchat-space Langchain-Chatchat up to 0.3.1.3. This issue affects the function PIL.Image.tobytes of the file libs/chatchat-server/chatchat/webui_pages/dialogue/dialogue.py of the component Vision Chat Paste Image Handler. This manipulation of the argument paste_image.image_data causes use of weak hash. The attacker needs to be present on the local network. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 2.1

Product Status

Vendor chatchat-space
Product Langchain-Chatchat
Versions
  • Version 0.3.1.0 is affected
  • Version 0.3.1.1 is affected
  • Version 0.3.1.2 is affected
  • Version 0.3.1.3 is affected

Credits

  • Dem00 (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Use of Weak Hash CWE
  • Risky Cryptographic Algorithm CWE