Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23835: CWE-73: External Control of File Name or Path in lobehub lobe-chat

0
Medium
VulnerabilityCVE-2026-23835cvecve-2026-23835cwe-73
Published: Fri Jan 30 2026 (01/30/2026, 20:04:23 UTC)
Source: CVE Database V5
Vendor/Project: lobehub
Product: lobe-chat

Description

LobeHub is an open source human-and-AI-agent network. Prior to version 1.143.3, the file upload feature in `Knowledge Base > File Upload` does not validate the integrity of the upload request, allowing users to intercept and modify the request parameters. As a result, it is possible to create arbitrary files in abnormal or unintended paths. In addition, since `lobechat.com` relies on the size parameter from the request to calculate file usage, an attacker can manipulate this value to misrepresent the actual file size, such as uploading a `1 GB` file while reporting it as `10 MB`, or falsely declaring a `10 MB` file as a `1 GB` file. By manipulating the size value provided in the client upload request, it is possible to bypass the monthly upload quota enforced by the server and continuously upload files beyond the intended storage and traffic limits. This abuse can result in a discrepancy between actual resource consumption and billing calculations, causing direct financial impact to the service operator. Additionally, exhaustion of storage or related resources may lead to degraded service availability, including failed uploads, delayed content delivery, or temporary suspension of upload functionality for legitimate users. A single malicious user can also negatively affect other users or projects sharing the same subscription plan, effectively causing an indirect denial of service (DoS). Furthermore, excessive and unaccounted-for uploads can distort monitoring metrics and overload downstream systems such as backup processes, malware scanning, and media processing pipelines, ultimately undermining overall operational stability and service reliability. Version 1.143.3 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 01/30/2026, 20:27:54 UTC

Technical Analysis

CVE-2026-23835 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the open-source human-and-AI-agent network platform LobeHub, specifically in its lobe-chat product. Versions prior to 1.143.3 contain a flaw in the file upload feature located in the Knowledge Base > File Upload section. The vulnerability arises because the system does not validate the integrity of upload requests, allowing an attacker to intercept and modify parameters such as the file path and size. This manipulation enables the creation of arbitrary files in abnormal or unintended directories, potentially leading to unauthorized file placement or overwriting. Furthermore, the system relies on the client-supplied size parameter to enforce monthly upload quotas. By falsifying this value, an attacker can upload files that exceed quota limits without detection, causing resource exhaustion. The consequences include direct financial losses due to billing discrepancies, degraded service availability (failed uploads, delayed content delivery, or temporary suspension of upload functionality), and indirect denial of service affecting other users sharing the same subscription. Additionally, the excessive uploads can distort monitoring metrics and overload downstream systems like backups, malware scanning, and media processing pipelines, undermining overall operational stability. The vulnerability does not require user interaction but does require the ability to upload files, implying some level of authenticated access. The issue was patched in version 1.143.3, which validates upload requests properly to prevent parameter tampering.

Potential Impact

For European organizations using lobehub's lobe-chat platform, this vulnerability poses several risks. Financially, operators may incur unexpected costs due to manipulated upload sizes bypassing quota enforcement, leading to overuse of storage and bandwidth without corresponding billing. Operationally, exhaustion of storage and processing resources can degrade service availability, impacting business continuity and user experience. Indirect denial of service can affect multiple users or projects under shared subscription plans, potentially disrupting collaborative workflows. The distortion of monitoring data and overload of backend systems can hinder incident detection and response capabilities, increasing the risk of unnoticed malicious activity or system failures. Organizations relying on lobe-chat for knowledge management or AI-agent collaboration may face interruptions or data integrity issues. Given the open-source nature and potential for deployment in diverse environments, the threat could affect sectors ranging from academia to enterprises leveraging AI collaboration tools. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.

Mitigation Recommendations

European organizations should immediately upgrade lobe-chat to version 1.143.3 or later to apply the official patch. Beyond patching, implement strict validation and sanitization of all file upload parameters on the server side to prevent tampering. Employ robust access controls to restrict upload capabilities to trusted users and monitor upload activities for anomalies such as unusual file paths or size discrepancies. Integrate quota enforcement mechanisms that rely on server-side calculations rather than client-supplied data to prevent quota bypass. Deploy file integrity monitoring and alerting systems to detect unauthorized file creations or modifications. Regularly audit storage usage and backup processes to identify abnormal consumption patterns. Consider isolating upload directories with strict permissions and sandboxing to limit the impact of arbitrary file writes. Enhance logging and monitoring of upload-related events to facilitate rapid detection and response. Finally, educate users and administrators about the risks of manipulating upload parameters and encourage prompt reporting of suspicious behavior.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-16T15:46:40.841Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697d10c0ac0632022277c27d

Added to database: 1/30/2026, 8:12:48 PM

Last enriched: 1/30/2026, 8:27:54 PM

Last updated: 2/7/2026, 7:41:01 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats