Lobehub Lobe-Chat vulnerabilities
10 known vulnerabilities affecting lobehub/lobe-chat.
Total CVEs
10
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM6LOW2
Vulnerabilities
Page 1 of 1
CVE-2026-23835MEDIUMCVSS 5.7fixed in 1.143.32026-01-30
CVE-2026-23835 [MEDIUM] CWE-73 CVE-2026-23835: LobeHub is an open source human-and-AI-agent network. Prior to version 1.143.3, the file upload feat
LobeHub is an open source human-and-AI-agent network. Prior to version 1.143.3, the file upload feature in `Knowledge Base > File Upload` does not validate the integrity of the upload request, allowing users to intercept and modify the request parameters. As a result, it is possible to create arbitrary files in abnormal or unintended paths. In additi
nvd
CVE-2026-23522LOWCVSS 3.7fixed in 2.0.0-next.1932026-01-19
CVE-2026-23522 [LOW] CWE-284 CVE-2026-23522: LobeChat is an open source chat application platform. Prior to version 2.0.0-next.193, `knowledgeBas
LobeChat is an open source chat application platform. Prior to version 2.0.0-next.193, `knowledgeBase.removeFilesFromKnowledgeBase` tRPC ep allows authenticated users to delete files from any knowledge base without verifying ownership. `userId` filter in the database query is commented out, so it's enabling attackers to delete other users' KB files if
nvd
CVE-2026-23733MEDIUMCVSS 6.4fixed in 2.0.0-next.1802026-01-18
CVE-2026-23733 [MEDIUM] CWE-94 CVE-2026-23733: LobeChat is an open source chat application platform. Prior to version 2.0.0-next.180, a stored Cros
LobeChat is an open source chat application platform. Prior to version 2.0.0-next.180, a stored Cross-Site Scripting (XSS) vulnerability in the Mermaid artifact renderer allows attackers to execute arbitrary JavaScript within the application context. This XSS can be escalated to Remote Code Execution (RCE) by leveraging the exposed `electronAPI` IPC
nvd
CVE-2025-62505LOWCVSS 3.0fixed in 1.136.22025-10-17
CVE-2025-62505 [LOW] CWE-918 CVE-2025-62505: LobeChat is an open source chat application platform. The web-crawler package in LobeChat version 1.
LobeChat is an open source chat application platform. The web-crawler package in LobeChat version 1.136.1 allows server-side request forgery (SSRF) in the tools.search.crawlPages tRPC endpoint. A client can supply an arbitrary urls array together with impls containing the value naive. The service passes the user URLs to Crawler.crawl and the naive impl
nvd
CVE-2025-59426MEDIUMCVSS 4.3fixed in 1.130.12025-09-25
CVE-2025-59426 [MEDIUM] CWE-601 CVE-2025-59426: Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.130.1, the pr
Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.130.1, the project's OIDC redirect handling logic constructs the host and protocol of the final redirect URL based on the X-Forwarded-Host or Host headers and the X-Forwarded-Proto value. In deployments where a reverse proxy forwards client-supplied X-Forwarded-*
nvd
CVE-2025-59417MEDIUMCVSS 6.8fixed in 1.129.42025-09-18
CVE-2025-59417 [MEDIUM] CWE-79 CVE-2025-59417: Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.129.4, there
Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.129.4, there is a a cross-site scripting (XSS) vulnerability when handling chat message in lobe-chat that can be escalated to remote code execution on the user’s machine. In lobe-chat, when the response from the server is like , it will be rendered with the lobeArti
nvd
CVE-2024-32965HIGHCVSS 8.6fixed in 1.19.132024-11-26
CVE-2024-32965 [HIGH] CWE-918 CVE-2024-32965: Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unaut
Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be m
nvd
CVE-2024-37895MEDIUMCVSS 5.7fixed in 0.162.252024-06-17
CVE-2024-37895 [MEDIUM] CWE-200 CVE-2024-37895: Lobe Chat is an open-source LLMs/AI chat framework. In affected versions if an attacker can successf
Lobe Chat is an open-source LLMs/AI chat framework. In affected versions if an attacker can successfully authenticate through SSO/Access Code, they can obtain the real backend API Key by modifying the base URL to their own attack URL on the frontend and setting up a server-side request. This issue has been addressed in version 0.162.25. Users are ad
nvd
CVE-2024-32964CRITICALCVSS 9.0PoCfixed in 1.19.132024-05-14
CVE-2024-32964 [CRITICAL] CWE-918 CVE-2024-32964: Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function
Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack i
nvd
CVE-2024-24566MEDIUMCVSS 5.3fixed in 0.122.42024-01-31
CVE-2024-24566 [MEDIUM] CWE-284 CVE-2024-24566: Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function
Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. When the application is password-protected (deployed with the `ACCESS_CODE` option), it is possible to access plugins without proper authorization (without password). This vulnerability is patched in 0.122.4.
nvd