<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Chroma — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/chroma/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 12:55:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/chroma/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unpatched ChromaDB Vulnerability CVE-2026-45829 Allows Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromadb-rce/</link><pubDate>Tue, 19 May 2026 12:55:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromadb-rce/</guid><description>An unpatched pre-authentication remote code execution (RCE) vulnerability, tracked as CVE-2026-45829 and referred to as ChromaToast, in ChromaDB versions 1.0.0 and later allows remote, unauthenticated attackers to execute arbitrary code and leak sensitive information, potentially leading to a server takeover.</description><content:encoded><![CDATA[<p>A critical unpatched vulnerability, CVE-2026-45829 (ChromaToast), exists in ChromaDB, an open-source vector database used in AI applications. This pre-authentication remote code execution (RCE) flaw affects versions 1.0.0 and later. The vulnerability stems from the server&rsquo;s trust in client-supplied model identifiers without proper authentication. An attacker can exploit this by providing a malicious HuggingFace model, which the server executes before conducting authentication checks. This allows the attacker to gain full control of the server process and access sensitive information, including API keys, environment variables, mounted secrets, and all files on the disk. Approximately 73% of internet-accessible ChromaDB deployments are estimated to be affected, with high-profile organizations like Mintlify, Factory AI, and Weights &amp; Biases potentially at risk. This flaw was reported as early as November 2025, but remains unpatched as of ChromaDB version 1.5.8.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious collection creation request to the ChromaDB server.</li>
<li>The request includes a crafted HuggingFace model identifier.</li>
<li>The ChromaDB server, without proper authentication, reaches out to HuggingFace.</li>
<li>The server downloads the attacker-controlled HuggingFace model.</li>
<li>The server executes the downloaded model.</li>
<li>This execution occurs before the server performs any authentication checks.</li>
<li>The attacker gains full control of the server process due to the RCE vulnerability.</li>
<li>The attacker can then access sensitive data, including API keys, environment variables, secrets, and files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45829 grants an unauthenticated attacker complete control over the ChromaDB server process. This allows the attacker to steal sensitive data such as API keys, environment variables, and other secrets stored on the server. The attacker can also access all files on the disk, potentially leading to data breaches and further compromise of the affected systems. With an estimated 73% of internet-accessible ChromaDB deployments vulnerable, this poses a significant risk to organizations using ChromaDB, especially those with default configurations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Restrict network access to ChromaDB to trusted clients only to mitigate the vulnerability, as suggested by HiddenLayer.</li>
<li>Apply the suggested remediation in the code: move the authentication check before configuration loading and stripping any keys named ‘kwargs’ from requests in both the V1 and V2 create_collection handles. This is mentioned in the overview.</li>
<li>Monitor network connections to ChromaDB servers for suspicious activity originating from untrusted sources.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>chromadb</category><category>rce</category><category>cve-2026-45829</category><category>huggingface</category><category>vectordatabase</category></item></channel></rss>