CVE-2026-22219
HIGH WAF: Medium
CVSS 7.7
Published: 2026-01-20
CWE-918
Chainlit versions prior to 2.9.4 contain a server-side request forgery (SSRF) vulnerability in the /project/element update flow when configured with the SQLAlchemy data layer backend. An authenticated client can provide a user-controlled url value in an Element, which is fetched by the SQLAlchemy element creation logic using an outbound HTTP GET request. This allows an attacker to make arbitrary HTTP requests from the Chainlit server to internal network services or cloud metadata endpoints and store the retrieved responses via the configured storage provider.
WAF Coverage Analysis
Server-Side Request Forgery (SSRF)
Medium WAF Coverage
OWASP: A10:2021 SSRF
934xxx - Node.js / Generic Injection
Affected Software
| Vendor | Product | Version |
|---|---|---|
| chainlit | chainlit | up to 2.9.4 |
References
- github.com (Product, Release Notes)
- www.vulncheck.com (Third Party Advisory)
- www.zafran.io (Exploit, Mitigation, Third Party Advisory)