CVE-2026-23842: ChatterBot Vulnerable to Denial of Service via Database Connection Pool Exhaustion
ChatterBot versions up to 1.2.10 are vulnerable to a denial-of-service condition caused by improper database session and connection pool management. Concurrent invocations of the get_response() method can exhaust the underlying SQLAlchemy connection pool, resulting in persistent service unavailability and requiring a manual restart to recover.
References
- github.com/advisories/GHSA-v4w8-49pv-mf72
- github.com/gunthercox/ChatterBot
- github.com/gunthercox/ChatterBot/commit/de89fe648139f8eeacc998ad4524fab291a378cf
- github.com/gunthercox/ChatterBot/pull/2432
- github.com/gunthercox/ChatterBot/releases/tag/1.2.11
- github.com/gunthercox/ChatterBot/security/advisories/GHSA-v4w8-49pv-mf72
- github.com/user-attachments/assets/4ee845c4-b847-4854-84ec-4b2fb2f7090f
- nvd.nist.gov/vuln/detail/CVE-2026-23842
Code Behaviors & Features
Detect and mitigate CVE-2026-23842 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →