CVE-2026-42276
Undergoing Analysis Undergoing Analysis - In Progress
Session Hijacking in Onyx AI Platform

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: GitHub, Inc.

Description
Onyx is an open-source AI platform. Prior to versions 3.0.9, 3.1.6, and 3.2.6, the POST /chat/stop-chat-session/{chat_session_id} endpoint lets any authenticated user stop any other user's active chat session. The endpoint checks authentication but never verifies the session belongs to the caller. An attacker who knows a chat session UUID can kill another user's LLM generation mid-stream. This issue has been patched in versions 3.0.9, 3.1.6, and 3.2.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
onyx onyx to 3.0.9 (exc)
onyx onyx From 3.1.0 (inc) to 3.1.6 (exc)
onyx onyx From 3.2.0 (inc) to 3.2.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows any authenticated user to terminate another user's active chat session without proper authorization checks. This could lead to denial of service for legitimate users and potential loss of partial output data during LLM generation.

While the CVE description and resources do not explicitly mention compliance with standards such as GDPR or HIPAA, the authorization bypass could impact data integrity and availability, which are important aspects of these regulations.

Specifically, interruption of user sessions without consent might violate principles of user control and data protection under such regulations, potentially leading to compliance risks.


Can you explain this vulnerability to me?

CVE-2026-42276 is an Insecure Direct Object Reference (IDOR) vulnerability in the Onyx AI platform's /chat/stop-chat-session endpoint.

This endpoint allows any authenticated user to stop another user's active chat session by providing the session UUID, without verifying that the session belongs to the caller.

Because the endpoint checks only authentication but not ownership, an attacker who knows a chat session UUID can interrupt another user's ongoing large language model (LLM) generation mid-stream.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to terminate other users' active chat sessions unexpectedly.

As a result, users may experience interruptions in receiving responses from the AI platform, leading to loss of partial output or incomplete interactions.

The attack requires low complexity and only authenticated privileges, but no user interaction, making it relatively easy for attackers with access to exploit.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring requests to the POST /chat/stop-chat-session/{chat_session_id} endpoint where an authenticated user attempts to stop chat sessions using session UUIDs that do not belong to them.

To detect potential exploitation, you can log and analyze API calls to this endpoint, checking for cases where the session UUID does not match the authenticated user's sessions.

Example commands to detect suspicious activity might include:

  • Using web server logs or API gateway logs, filter POST requests to /chat/stop-chat-session and correlate the authenticated user with the session UUID being stopped.
  • If using Linux command line tools, you might run: `grep 'POST /chat/stop-chat-session' /var/log/onyx/access.log | awk '{print $user, $session_uuid}'` to extract user and session UUID pairs for analysis.
  • Use network monitoring tools to capture and inspect HTTP POST requests to the vulnerable endpoint, looking for mismatches between the authenticated user and the session UUID targeted.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Onyx application to a patched version where this vulnerability is fixed.

  • Upgrade to Onyx version 3.0.9, 3.1.6, or 3.2.6 or later, as these versions include the patch that verifies session ownership before allowing a chat session to be stopped.
  • Restrict access to the /chat/stop-chat-session endpoint to only trusted users or roles until the upgrade can be applied.
  • Monitor logs for suspicious activity involving the stopping of chat sessions by users other than the session owners.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart