ChromaDB, a vector database widely used in AI and machine learning applications, contains a critical remote code execution vulnerability that allows unauthenticated attackers to seize control of exposed servers.

The flaw affects the Python FastAPI implementation of ChromaDB. Attackers exploit the vulnerability to execute arbitrary code directly on vulnerable systems without requiring any credentials or authentication tokens. This grants complete server access and control.

Vector databases like ChromaDB store embeddings and metadata for large language models and AI inference workloads. Organizations using ChromaDB as a backend for generative AI applications face direct exposure to takeover attacks. An attacker gaining code execution can steal training data, poison model outputs, exfiltrate proprietary AI models, or pivot to internal networks.

The vulnerability carries a CVSS severity rating of 9.8, classifying it as maximum-severity. This reflects the combination of unauthenticated access requirements and the ability to run arbitrary code. ChromaDB instances exposed to untrusted networks become immediate targets.

Organizations running ChromaDB deployments must prioritize patching. The affected versions include the latest Python FastAPI releases. Vendors and developers relying on ChromaDB for production AI systems should check their current versions against available patches and apply updates immediately.

Network segmentation provides temporary mitigation. Restricting ChromaDB instances to internal networks only and implementing firewall rules prevents exploitation from internet-facing attacks. However, segmentation does not replace patching.

The discovery highlights the expanding attack surface in AI infrastructure. Vector databases represent a new class of critical systems managing valuable intellectual property and model architectures. As organizations accelerate AI deployment, securing these databases becomes essential to preventing data breaches and model theft.

ChromaDB maintainers have released patches addressing the vulnerability. Organizations should verify they run patched versions and monitor for suspicious connections or code execution attempts on ChromaDB servers.