CVE-2026-23835External Control of File Name or Path in Lobe-chat

Severity
5.7MEDIUMNVD
EPSS
0.0%
top 94.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 30
Latest updateFeb 1

Description

LobeHub is an open source human-and-AI-agent network. Prior to version 1.143.3, the file upload feature in `Knowledge Base > File Upload` does not validate the integrity of the upload request, allowing users to intercept and modify the request parameters. As a result, it is possible to create arbitrary files in abnormal or unintended paths. In addition, since `lobechat.com` relies on the size parameter from the request to calculate file usage, an attacker can manipulate this value to misrepresen

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

npmlobehub/chat< 1.143.3
CVEListV5lobehub/lobe-chat< 1.143.3

🔴Vulnerability Details

2
OSV
LobeHub Vulnerable to Improper Authorization in Presigned Upload2026-02-01
GHSA
LobeHub Vulnerable to Improper Authorization in Presigned Upload2026-02-01

🕵️Threat Intelligence

1
Wiz
CVE-2026-23835 Impact, Exploitability, and Mitigation Steps | Wiz