CVE-2026-23835: CWE-73: External Control of File Name or Path in lobehub lobe-chat
LobeHub is an open source human-and-AI-agent network. Prior to version 1.143.3, the file upload feature in `Knowledge Base > File Upload` does not validate the integrity of the upload request, allowing users to intercept and modify the request parameters. As a result, it is possible to create arbitrary files in abnormal or unintended paths. In addition, since `lobechat.com` relies on the size parameter from the request to calculate file usage, an attacker can manipulate this value to misrepresent the actual file size, such as uploading a `1 GB` file while reporting it as `10 MB`, or falsely declaring a `10 MB` file as a `1 GB` file. By manipulating the size value provided in the client upload request, it is possible to bypass the monthly upload quota enforced by the server and continuously upload files beyond the intended storage and traffic limits. This abuse can result in a discrepancy between actual resource consumption and billing calculations, causing direct financial impact to the service operator. Additionally, exhaustion of storage or related resources may lead to degraded service availability, including failed uploads, delayed content delivery, or temporary suspension of upload functionality for legitimate users. A single malicious user can also negatively affect other users or projects sharing the same subscription plan, effectively causing an indirect denial of service (DoS). Furthermore, excessive and unaccounted-for uploads can distort monitoring metrics and overload downstream systems such as backup processes, malware scanning, and media processing pipelines, ultimately undermining overall operational stability and service reliability. Version 1.143.3 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2026-23835 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the open-source human-and-AI-agent network platform LobeHub, specifically in its lobe-chat product. Versions prior to 1.143.3 contain a flaw in the file upload feature located in the Knowledge Base > File Upload section. The vulnerability arises because the system does not validate the integrity of upload requests, allowing an attacker to intercept and modify parameters such as the file path and size. This manipulation enables the creation of arbitrary files in abnormal or unintended directories, potentially leading to unauthorized file placement or overwriting. Furthermore, the system relies on the client-supplied size parameter to enforce monthly upload quotas. By falsifying this value, an attacker can upload files that exceed quota limits without detection, causing resource exhaustion. The consequences include direct financial losses due to billing discrepancies, degraded service availability (failed uploads, delayed content delivery, or temporary suspension of upload functionality), and indirect denial of service affecting other users sharing the same subscription. Additionally, the excessive uploads can distort monitoring metrics and overload downstream systems like backups, malware scanning, and media processing pipelines, undermining overall operational stability. The vulnerability does not require user interaction but does require the ability to upload files, implying some level of authenticated access. The issue was patched in version 1.143.3, which validates upload requests properly to prevent parameter tampering.
Potential Impact
For European organizations using lobehub's lobe-chat platform, this vulnerability poses several risks. Financially, operators may incur unexpected costs due to manipulated upload sizes bypassing quota enforcement, leading to overuse of storage and bandwidth without corresponding billing. Operationally, exhaustion of storage and processing resources can degrade service availability, impacting business continuity and user experience. Indirect denial of service can affect multiple users or projects under shared subscription plans, potentially disrupting collaborative workflows. The distortion of monitoring data and overload of backend systems can hinder incident detection and response capabilities, increasing the risk of unnoticed malicious activity or system failures. Organizations relying on lobe-chat for knowledge management or AI-agent collaboration may face interruptions or data integrity issues. Given the open-source nature and potential for deployment in diverse environments, the threat could affect sectors ranging from academia to enterprises leveraging AI collaboration tools. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
European organizations should immediately upgrade lobe-chat to version 1.143.3 or later to apply the official patch. Beyond patching, implement strict validation and sanitization of all file upload parameters on the server side to prevent tampering. Employ robust access controls to restrict upload capabilities to trusted users and monitor upload activities for anomalies such as unusual file paths or size discrepancies. Integrate quota enforcement mechanisms that rely on server-side calculations rather than client-supplied data to prevent quota bypass. Deploy file integrity monitoring and alerting systems to detect unauthorized file creations or modifications. Regularly audit storage usage and backup processes to identify abnormal consumption patterns. Consider isolating upload directories with strict permissions and sandboxing to limit the impact of arbitrary file writes. Enhance logging and monitoring of upload-related events to facilitate rapid detection and response. Finally, educate users and administrators about the risks of manipulating upload parameters and encourage prompt reporting of suspicious behavior.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2026-23835: CWE-73: External Control of File Name or Path in lobehub lobe-chat
Description
LobeHub is an open source human-and-AI-agent network. Prior to version 1.143.3, the file upload feature in `Knowledge Base > File Upload` does not validate the integrity of the upload request, allowing users to intercept and modify the request parameters. As a result, it is possible to create arbitrary files in abnormal or unintended paths. In addition, since `lobechat.com` relies on the size parameter from the request to calculate file usage, an attacker can manipulate this value to misrepresent the actual file size, such as uploading a `1 GB` file while reporting it as `10 MB`, or falsely declaring a `10 MB` file as a `1 GB` file. By manipulating the size value provided in the client upload request, it is possible to bypass the monthly upload quota enforced by the server and continuously upload files beyond the intended storage and traffic limits. This abuse can result in a discrepancy between actual resource consumption and billing calculations, causing direct financial impact to the service operator. Additionally, exhaustion of storage or related resources may lead to degraded service availability, including failed uploads, delayed content delivery, or temporary suspension of upload functionality for legitimate users. A single malicious user can also negatively affect other users or projects sharing the same subscription plan, effectively causing an indirect denial of service (DoS). Furthermore, excessive and unaccounted-for uploads can distort monitoring metrics and overload downstream systems such as backup processes, malware scanning, and media processing pipelines, ultimately undermining overall operational stability and service reliability. Version 1.143.3 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-23835 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the open-source human-and-AI-agent network platform LobeHub, specifically in its lobe-chat product. Versions prior to 1.143.3 contain a flaw in the file upload feature located in the Knowledge Base > File Upload section. The vulnerability arises because the system does not validate the integrity of upload requests, allowing an attacker to intercept and modify parameters such as the file path and size. This manipulation enables the creation of arbitrary files in abnormal or unintended directories, potentially leading to unauthorized file placement or overwriting. Furthermore, the system relies on the client-supplied size parameter to enforce monthly upload quotas. By falsifying this value, an attacker can upload files that exceed quota limits without detection, causing resource exhaustion. The consequences include direct financial losses due to billing discrepancies, degraded service availability (failed uploads, delayed content delivery, or temporary suspension of upload functionality), and indirect denial of service affecting other users sharing the same subscription. Additionally, the excessive uploads can distort monitoring metrics and overload downstream systems like backups, malware scanning, and media processing pipelines, undermining overall operational stability. The vulnerability does not require user interaction but does require the ability to upload files, implying some level of authenticated access. The issue was patched in version 1.143.3, which validates upload requests properly to prevent parameter tampering.
Potential Impact
For European organizations using lobehub's lobe-chat platform, this vulnerability poses several risks. Financially, operators may incur unexpected costs due to manipulated upload sizes bypassing quota enforcement, leading to overuse of storage and bandwidth without corresponding billing. Operationally, exhaustion of storage and processing resources can degrade service availability, impacting business continuity and user experience. Indirect denial of service can affect multiple users or projects under shared subscription plans, potentially disrupting collaborative workflows. The distortion of monitoring data and overload of backend systems can hinder incident detection and response capabilities, increasing the risk of unnoticed malicious activity or system failures. Organizations relying on lobe-chat for knowledge management or AI-agent collaboration may face interruptions or data integrity issues. Given the open-source nature and potential for deployment in diverse environments, the threat could affect sectors ranging from academia to enterprises leveraging AI collaboration tools. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
European organizations should immediately upgrade lobe-chat to version 1.143.3 or later to apply the official patch. Beyond patching, implement strict validation and sanitization of all file upload parameters on the server side to prevent tampering. Employ robust access controls to restrict upload capabilities to trusted users and monitor upload activities for anomalies such as unusual file paths or size discrepancies. Integrate quota enforcement mechanisms that rely on server-side calculations rather than client-supplied data to prevent quota bypass. Deploy file integrity monitoring and alerting systems to detect unauthorized file creations or modifications. Regularly audit storage usage and backup processes to identify abnormal consumption patterns. Consider isolating upload directories with strict permissions and sandboxing to limit the impact of arbitrary file writes. Enhance logging and monitoring of upload-related events to facilitate rapid detection and response. Finally, educate users and administrators about the risks of manipulating upload parameters and encourage prompt reporting of suspicious behavior.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-16T15:46:40.841Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697d10c0ac0632022277c27d
Added to database: 1/30/2026, 8:12:48 PM
Last enriched: 1/30/2026, 8:27:54 PM
Last updated: 2/7/2026, 7:41:01 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.