{"id":390316,"date":"2026-01-25T21:51:24","date_gmt":"2026-01-25T21:51:24","guid":{"rendered":"https:\/\/www.newsbeep.com\/uk\/390316\/"},"modified":"2026-01-25T21:51:24","modified_gmt":"2026-01-25T21:51:24","slug":"ai-framework-flaws-put-enterprise-clouds-at-risk-of-takeover-the-register","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/uk\/390316\/","title":{"rendered":"AI framework flaws put enterprise clouds at risk of takeover \u2022 The Register"},"content":{"rendered":"<p>Two &#8220;easy-to-exploit&#8221; vulnerabilities in the popular open-source AI framework Chainlit put major enterprises&#8217; cloud environments at risk of leaking data or even full takeover, according to cyber-threat exposure startup Zafran.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/chainlit.io\/\">Chainlit<\/a> is a Python package that organizations can use to build production-ready AI chatbots and applications. Corporations can either use Chainlit&#8217;s built-in UI and backend, or create their own frontend on top of Chainlit&#8217;s backend. It also integrates with other tools and platforms including LangChain, OpenAI, Bedrock, and LlamaIndex, and supports authentication and cloud deployment options.<\/p>\n<p>It&#8217;s downloaded about 700,000 times every month and saw 5 million downloads last year.<\/p>\n<p>The two vulnerabilities are <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/vimeo.com\/1153730184\/da4b79f97a?share=copy&amp;fl=sv&amp;fe=ci\">CVE-2026-22218<\/a>, which allows arbitrary file read, and <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/vimeo.com\/1153730406\/ddf58594ce?share=copy&amp;fl=sv&amp;fe=ci\">CVE-2026-22219<\/a>, which can lead to server-side request forgery (SSRF) attacks on the servers hosting AI applications.<\/p>\n<p>While Zafran didn&#8217;t see any indications of in-the-wild exploitation, &#8220;the internet-facing applications we observed belonged to the financial services and energy sectors, and universities are also using this framework,&#8221; CTO Ben Seri told The Register.<\/p>\n<p>Zafran disclosed the bugs to the project&#8217;s maintainers in November, and a month later, Chainlit <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/github.com\/Chainlit\/chainlit\/releases\/tag\/2.9.4\">released<\/a> a patched version (2.9.4) that fixes the flaws. So if you use Chainlit, make sure to update the framework to the fixed release.\u00a0<\/p>\n<p>Arbitrary file read<\/p>\n<p>The arbitrary file read flaw, CVE-2026-22218, has to do with how the framework handles elements \u2013 these are pieces of content, such as a file or image, that can be attached to a message. It can be triggered by sending a malicious update element request with a tampered custom element, and abused to exfiltrate environment variables by reading \/proc\/self\/environ.\u00a0<\/p>\n<p>&#8220;These variables often contain highly sensitive values that the system and enterprise depend on, including API keys, credentials, internal file paths, internal IPs, and ports,&#8221; according to Zafran&#8217;s analysis, shared with The Register ahead of publication. &#8220;This is mostly dangerous in AI systems where the servers have access to internal data of the company to provide a tailored chatbot experience to their users.&#8221;\u00a0<\/p>\n<p>In environments where authentication is enabled, attackers can steal secrets used to sign authentication tokens (CHAINLIT_AUTH_SECRET). These secrets, when combined with user identifiers \u2013 leaked from databases or inferred from organization emails \u2013 can be abused to forge authentication tokens and fully take over users&#8217; Chainlit accounts.<\/p>\n<p>Other environment variables up for grabs may include cloud credentials \u2013 such as AWS_SECRET_KEY \u2013 that Chainlit requires for cloud storage, along with sensitive API keys or the addresses and names of internal services.<\/p>\n<p>Plus, an attacker can probe these addresses using the second SSRF vulnerability to access sensitive data from internal REST APIs.\u00a0<\/p>\n<p>Server-side request forgery<\/p>\n<p>Zafran found the SSRF vulnerability, CVE-2026-22219, in the SQLAlchemy data layer. This one is triggered in the same way as the arbitrary file read \u2013 via a tampered custom element. Then, the attacker can retrieve the copied file by extracting the element&#8217;s &#8220;chainlit key&#8221; property from the metadata, download the file to an attacker-controlled computer, and query the file to access conversation history.<\/p>\n<p>According to Seri, the vulnerabilities are &#8220;easy to exploit,&#8221; and can be combined in multiple ways to leak sensitive data, escalate privileges, and move laterally within the system.<\/p>\n<p>&#8220;An attacker only needs to send a simple command and change one value to point to the file or URL they want to access,&#8221; he said.\u00a0<\/p>\n<p>&#8220;Regarding how the vulnerabilities can be combined, SSRF typically requires knowledge of the server environment,&#8221; Seri added. &#8220;By leveraging the read-file vulnerability to leak that information, such as environment details or internal addresses, it becomes much easier to successfully carry out the SSRF attack.&#8221;<\/p>\n<p>Companies increasingly use AI frameworks to build their own AI chatbots and apps, and Seri acknowledges that organizations are &#8220;working under very tight timelines to deliver fully functioning AI systems that integrate with highly sensitive data.&#8221;<\/p>\n<p>Using third-party frameworks and open-source code allows development teams to move fast \u2013 and it introduces new risks to the environment.<\/p>\n<p>&#8220;The risk is not the use of third-party code by itself, but the combination of rapid integration, limited understanding of the added code, and reliance on external maintainers for security and code quality,&#8221; Seri said. &#8220;As a result, organizations end up deploying backend servers that communicate with clients, cloud resources, and LLMs, creating multiple entry points where vulnerabilities can emerge and put the system at risk.&#8221; \u00ae<\/p>\n","protected":false},"excerpt":{"rendered":"Two &#8220;easy-to-exploit&#8221; vulnerabilities in the popular open-source AI framework Chainlit put major enterprises&#8217; cloud environments at risk of&hellip;\n","protected":false},"author":2,"featured_media":390317,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[554,733,4308,86,56,54,55],"class_list":{"0":"post-390316","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-technology","12":"tag-uk","13":"tag-united-kingdom","14":"tag-unitedkingdom"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/390316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/comments?post=390316"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/390316\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media\/390317"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media?parent=390316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/categories?post=390316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/tags?post=390316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}