Home

Description

Onyx is an open-source AI platform. Prior to versions 3.0.9, 3.1.6, and 3.2.6, the GET /chat/file/{file_id} endpoint allows any authenticated user to download any other user's uploaded files by providing the file UUID. The endpoint verifies the caller is authenticated but never checks that the file belongs to them. An attacker who knows or obtains a file UUID can access confidential documents, chat attachments, and other files uploaded by any user in the system. This issue has been patched in versions 3.0.9, 3.1.6, and 3.2.6.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

< 3.0.9
affected

>= 3.1.0, < 3.1.6
affected

>= 3.2.0, < 3.2.6
affected

References

github.com/...p/onyx/security/advisories/GHSA-vg3h-35f7-7w6r exploit

github.com/...p/onyx/security/advisories/GHSA-vg3h-35f7-7w6r

cve.org (CVE-2026-42277)

nvd.nist.gov (CVE-2026-42277)

Download JSON