Home

Description

ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an <iframe> payload containing a javascript: URI can be processed and executed in the browser context. This allows access to sensitive client-side data such as localStorage tokens and cookies, resulting in client-side injection. This issue has been fixed in version 1.0.9.

PUBLISHED Reserved 2026-01-22 | Published 2026-01-24 | Updated 2026-01-26 | Assigner GitHub_M




CRITICAL: 9.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 1.0.9
affected

References

github.com/...e.chat/security/advisories/GHSA-72p3-w95w-q3j4

github.com/...ommit/ff3398031abb97ae28546eaf993fed3619eaffdd

github.com/chattermate/chattermate.chat/releases/tag/v1.0.9

cve.org (CVE-2026-24399)

nvd.nist.gov (CVE-2026-24399)

Download JSON