Mudler

Localai

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 20.03.2025 10:11:01
  • Zuletzt bearbeitet 15.04.2025 16:15:47

Rejected reason: ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-48057. Notes: All CVE users should reference CVE-2024-48057 instead of this CVE Record. All references and descriptions in this candidate ...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 20.03.2025 10:09:14
  • Zuletzt bearbeitet 04.04.2025 09:15:16

mudler/localai version v2.21.1 contains a Cross-Site Scripting (XSS) vulnerability in its search functionality. The vulnerability arises due to improper sanitization of user input, allowing the injection and execution of arbitrary JavaScript code. Th...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 04.11.2024 23:15:04
  • Zuletzt bearbeitet 04.09.2025 16:15:35

localai <=2.20.1 is vulnerable to Cross Site Scripting (XSS). When calling the delete model API and passing inappropriate parameters, it can cause a one-time storage XSS, which will trigger the payload when a user accesses the homepage.

Exploit
  • EPSS 0.63%
  • Veröffentlicht 29.10.2024 13:15:08
  • Zuletzt bearbeitet 15.10.2025 13:15:50

mudler/LocalAI version 2.17.1 allows for arbitrary file write due to improper handling of automatic archive extraction. When model configurations specify additional files as archives (e.g., .tar), these archives are automatically extracted after down...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 29.10.2024 13:15:08
  • Zuletzt bearbeitet 15.10.2025 13:15:50

mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of passwo...

Exploit
  • EPSS 6.48%
  • Veröffentlicht 27.09.2024 16:15:06
  • Zuletzt bearbeitet 10.07.2025 21:37:19

mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file a...

Exploit
  • EPSS 88.97%
  • Veröffentlicht 06.07.2024 18:15:02
  • Zuletzt bearbeitet 21.11.2024 09:48:57

A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 06.07.2024 09:15:02
  • Zuletzt bearbeitet 15.07.2025 13:24:01

A Cross-Site Request Forgery (CSRF) vulnerability exists in mudler/LocalAI versions up to and including 2.15.0, which allows attackers to trick victims into deleting installed models. By crafting a malicious HTML page, an attacker can cause the delet...

Exploit
  • EPSS 1.05%
  • Veröffentlicht 26.06.2024 03:15:10
  • Zuletzt bearbeitet 15.07.2025 15:38:01

A command injection vulnerability exists in the mudler/localai version 2.14.0. The vulnerability arises from the application's handling of the backend parameter in the configuration file, which is used in the name of the initialized process. An attac...

Exploit
  • EPSS 2.49%
  • Veröffentlicht 20.06.2024 00:15:09
  • Zuletzt bearbeitet 21.11.2024 09:47:08

A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` pa...