Home

Description

Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.129.4, there is a a cross-site scripting (XSS) vulnerability when handling chat message in lobe-chat that can be escalated to remote code execution on the user’s machine. In lobe-chat, when the response from the server is like <lobeArtifact identifier="ai-new-interpretation" ...> , it will be rendered with the lobeArtifact node, instead of the plain text. However, when the type of the lobeArtifact is image/svg+xml , it will be rendered as the SVGRender component, which internally uses dangerouslySetInnerHTML to set the content of the svg, resulting in XSS attack. Any party capable of injecting content into chat messages, such as hosting a malicious page for prompt injection, operating a compromised MCP server, or leveraging tool integrations, can exploit this vulnerability. This vulnerability is fixed in 1.129.4.

PUBLISHED Reserved 2025-09-15 | Published 2025-09-18 | Updated 2025-09-19 | Assigner GitHub_M




MEDIUM: 6.8CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 1.129.4
affected

References

github.com/...e-chat/security/advisories/GHSA-m79r-r765-5f9j exploit

github.com/...e-chat/security/advisories/GHSA-m79r-r765-5f9j

github.com/...ommit/9f044edd07ce102fe9f4b2fb47c62191c36da05c

cve.org (CVE-2025-59417)

nvd.nist.gov (CVE-2025-59417)

Download JSON