PT-2026-41683 · Chromadb · Chromadb
Esteban Tonglet
·
Published
2026-05-18
·
Updated
2026-05-20
·
CVE-2026-45829
CVSS v4.0
10
Critical
| Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Name of the Vulnerable Software and Affected Versions
ChromaDB versions 1.0.0 and later
Description
A pre-authentication code injection issue allows an unauthenticated attacker to execute arbitrary code on the server. The flaw stems from the server trusting client-provided model identifiers and acting upon them before authenticating the user. An attacker can trigger this by sending a request to create a collection using the '/api/v2/tenants/{tenant}/databases/{db}/collections' endpoint, providing a malicious model repository (such as a crafted HuggingFace model) and setting the
trust remote code variable to true. This can lead to full server takeover, privilege escalation, lateral movement, and the leakage of sensitive information, including API keys, environment variables, and disk files. Approximately 73% of internet-facing deployments are estimated to be affected.Recommendations
Restrict network access to ChromaDB exclusively to trusted clients.
As a temporary mitigation, avoid setting the
trust remote code variable to true when interacting with the '/api/v2/tenants/{tenant}/databases/{db}/collections' endpoint.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
RCE
LPE
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Chromadb