CVE-2023-34094: ChuanhuChatGPT: config exposure leaks API keys
MEDIUMChuanhuChatGPT deployments without authentication configured expose their config.json file to any unauthenticated network attacker, directly leaking LLM API keys stored in plaintext. The attack is trivial — no credentials, no user interaction, just a network request — and the exposed file typically contains API keys for OpenAI or other LLM providers. While not in CISA KEV and scored medium (CVSS 5.3), the practical blast radius exceeds the rating: stolen keys enable unauthorized model inference, cost harvesting against the victim's account, and potential access to associated provider resources such as fine-tuned models or uploaded files. Update to commit bfac445 or later, enable access authentication immediately, and rotate any API keys that may have been exposed.
Risk Assessment
Practical risk exceeds the CVSS 5.3 medium rating. All four network-facing exploitability factors are worst-case: AV:N, AC:L, PR:N, UI:N — making this trivially exploitable by any unauthenticated actor with network reach. The real damage is downstream: stolen LLM API keys enable cost harvesting, unauthorized inference, and potential pivot into associated provider accounts. Self-hosted deployments in enterprise or research environments assuming network perimeter protection are silently exposed if the service is accidentally internet-facing or if an internal threat actor is present.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| chuanhuchatgpt | pip | — | No patch |
Do you use chuanhuchatgpt? You're affected.
Severity & Risk
Recommended Action
- Patch: upgrade to commit bfac445 or any release after 20230526 — the vulnerability is fixed there.
- Workaround: enable access authentication on all ChuanhuChatGPT deployments immediately; do not rely on network perimeter alone.
- Key rotation: rotate all LLM API keys stored in config.json for any instance potentially reachable from untrusted networks.
- Detection: audit web server access logs for GET requests to config.json; any HTTP 200 response to an unexpected IP indicates potential compromise.
- Inventory: scan internal network for unauthenticated ChuanhuChatGPT instances via port scanning and UI fingerprinting.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
ChuanhuChatGPT is a graphical user interface for ChatGPT and many large language models. A vulnerability in versions 20230526 and prior allows unauthorized access to the config.json file of the privately deployed ChuanghuChatGPT project, when authentication is not configured. The attacker can exploit this vulnerability to steal the API keys in the configuration file. The vulnerability has been fixed in commit bfac445. As a workaround, setting up access authentication can help mitigate the vulnerability.
Exploitation Scenario
An attacker scans internet-facing hosts for ChuanhuChatGPT deployments identifiable by UI fingerprinting or known default ports. On a deployment without authentication configured, they issue a direct HTTP GET to the config.json endpoint. The server returns the file in plaintext, including OpenAI or other LLM provider API keys. The attacker then uses these keys to run automated workloads under the victim's account — exhausting API credits, querying the model with sensitive prompts, or enumerating provider-side assets such as fine-tuned models and uploaded files. If the key carries organization-level permissions, the attacker gains visibility into the full API usage history and any data stored with the provider.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2024-3234 9.8 ChuanhuChatGPT: path traversal exposes LLM API keys
Same package: chuanhuchatgpt CVE-2024-10650 ChuanhuChatGPT: DoS via multipart payload exhaustion
Same package: chuanhuchatgpt CVE-2024-10707 ChuanhuChatGPT: path traversal exposes server files unauthed
Same package: chuanhuchatgpt CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction
AI Threat Alert