CVE-2025-68492

Source
https://cve.org/CVERecord?id=CVE-2025-68492
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68492.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68492
Aliases
Published
2026-01-14T07:16:14.627Z
Modified
2026-03-13T03:48:57.623402Z
Severity
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Chainlit versions prior to 2.8.5 contain an authorization bypass through user-controlled key vulnerability. If this vulnerability is exploited, threads may be viewed or thread ownership may be obtained by an attacker who can log in to the product.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68492.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "user-controlled"
            }
        ]
    }
]