CVE-2024-10650

UNKNOWN

ChuanhuChatGPT: DoS via multipart payload exhaustion

Published March 20, 2025
CISO Take

ChuanhuChatGPT remains vulnerable to DoS despite a prior patch (CVE-2024-7807) — attackers can craft multipart requests with specific 10-char-per-line patterns to exhaust server processing with minimal bandwidth. Update immediately to the latest version and add WAF-level rate limiting on multipart requests. Low risk for most enterprises, but critical if this tool is exposed as a self-hosted ChatGPT interface to internal or external users.

Affected Systems

Package Ecosystem Vulnerable Range Patched
chuanhuchatgpt No patch

Do you use chuanhuchatgpt? You're affected.

Severity & Risk

CVSS 3.1
N/A
EPSS
N/A
KEV Status
Not in KEV
Sophistication
Trivial

Recommended Action

  1. 1. Upgrade ChuanhuChatGPT beyond version 20240918 immediately. 2. Add WAF/proxy rules to enforce maximum multipart part count and line length limits. 3. Configure request size limits and connection timeouts at the reverse proxy (nginx/Caddy) layer. 4. Enable authentication if not already active — reduces attack surface from unauthenticated to low-privilege. 5. Monitor access logs for anomalous multipart request volumes or unusual boundary patterns as a detection signal.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 9 - Risk management system
ISO 42001
6.1.2 - AI risk assessment
NIST AI RMF
MANAGE-2.2 - Mechanisms to sustain AI system availability and resilience
OWASP LLM Top 10
LLM10 - Unbounded Consumption

Technical Details

NVD Description

An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio.

Exploitation Scenario

An adversary sends crafted HTTP multipart POST requests to the ChuanhuChatGPT endpoint, structuring the multipart body with boundaries split into groups of exactly 10 characters per line across many lines. The server iterates character-by-character over this crafted structure, consuming CPU in a tight processing loop. A single attacker with low bandwidth can sustain the condition indefinitely, keeping the service unavailable for legitimate users without triggering volumetric DoS detection thresholds.

Weaknesses (CWE)

Timeline

Published
March 20, 2025
Last Modified
October 15, 2025
First Seen
March 20, 2025