CVE-2026-24399
Published: 24 January 2026
Summary
CVE-2026-24399 is a critical-severity Cross-site Scripting (CWE-79) vulnerability in Chattermate Chattermate. Its CVSS base score is 9.3 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 2.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Machine Learning Libraries.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces validation of untrusted chat inputs to reject or sanitize malicious HTML/JavaScript payloads such as <iframe> with javascript: URIs before browser processing.
Filters chatbot outputs or reflected inputs to prevent execution of injected scripts in the victim browser context, blocking client-side data theft.
Identifies and remediates the specific XSS flaw by applying patches like ChatterMate v1.0.9, restoring secure input handling.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS directly enables browser session hijacking and theft of web session cookies/application access tokens via client-side JS execution on chat input.
NVD Description
ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an <iframe> payload containing a javascript: URI can be processed and executed in…
more
the browser context. This allows access to sensitive client-side data such as localStorage tokens and cookies, resulting in client-side injection. This issue has been fixed in version 1.0.9.
Deeper analysisAI
CVE-2026-24399 is a cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting ChatterMate, a no-code AI chatbot agent framework in versions 1.0.8 and below. The flaw occurs when the chatbot processes chat input containing malicious HTML/JavaScript payloads, such as an <iframe> element with a javascript: URI, which is then executed directly in the victim's browser context. This client-side injection enables unauthorized access to sensitive data stored client-side, including localStorage tokens and cookies. The vulnerability carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N), indicating critical severity due to its network accessibility, low complexity, and high impact on confidentiality and integrity with changed scope.
Attackers can exploit this vulnerability remotely without privileges by tricking users into submitting crafted chat inputs to a ChatterMate instance, requiring only user interaction such as pasting or entering the payload. No authentication is needed, making it accessible to any adversary. Successful exploitation grants the attacker the ability to steal sensitive client-side data like authentication tokens and cookies in the browser's context, potentially leading to session hijacking, account takeover, or further phishing attacks leveraging the stolen credentials.
Mitigation is available through upgrading to ChatterMate version 1.0.9, where the issue has been addressed. Official advisories and patches are detailed in the GitHub security advisory (GHSA-72p3-w95w-q3j4), the release notes for v1.0.9, and the fixing commit (ff3398031abb97ae28546eaf993fed3619eaffdd), recommending immediate updates for all affected deployments.
As a framework for no-code AI chatbot agents, this vulnerability highlights risks in client-side processing of user inputs in AI-driven web applications, though no public evidence of real-world exploitation has been reported as of the CVE publication on 2026-01-24.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Machine Learning Libraries
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: ai