Lollms

Lollms

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.01%
  • Veröffentlicht 12.04.2026 02:22:52
  • Zuletzt bearbeitet 17.04.2026 16:18:09

A Cross-site Scripting (XSS) vulnerability was identified in the `from_dict` method of the `AppLollmsMessage` class in parisneo/lollms prior to version 2.2.0. The vulnerability arises from the lack of sanitization or HTML encoding of the `content` fi...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 10.04.2026 07:16:20
  • Zuletzt bearbeitet 16.04.2026 19:39:35

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the latest version prior to 2.2.0. The vulnerability exists in the `create_post` function within `backend/routers/social/__init__.py`...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 29.03.2026 17:53:08
  • Zuletzt bearbeitet 31.03.2026 19:45:54

A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related e...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 29.03.2026 17:51:20
  • Zuletzt bearbeitet 31.03.2026 19:37:38

A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate u...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 29.03.2026 17:49:44
  • Zuletzt bearbeitet 31.03.2026 19:30:04

A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 11.10.2024 16:15:14
  • Zuletzt bearbeitet 15.11.2024 17:10:59

A path traversal vulnerability exists in the api open_personality_folder endpoint of parisneo/lollms-webui. This vulnerability allows an attacker to read any folder in the personality_folder on the victim's computer, even though sanitize_path is set....

Exploit
  • EPSS 0.1%
  • Veröffentlicht 24.06.2024 03:15:09
  • Zuletzt bearbeitet 21.11.2024 09:42:57

A Cross-Site Request Forgery (CSRF) vulnerability exists in the XTTS server of parisneo/lollms version 9.6 due to a lax CORS policy. The vulnerability allows attackers to perform unauthorized actions by tricking a user into visiting a malicious webpa...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 24.06.2024 00:15:09
  • Zuletzt bearbeitet 21.11.2024 09:28:56

A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject a...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 06.06.2024 19:16:03
  • Zuletzt bearbeitet 21.11.2024 09:43:46

A path traversal vulnerability exists in the parisneo/lollms application, affecting version 9.4.0 and potentially earlier versions, but fixed in version 5.9.0. The vulnerability arises due to improper validation of file paths between Windows and Linu...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 06.06.2024 19:16:02
  • Zuletzt bearbeitet 21.11.2024 09:29:35

A path traversal vulnerability exists in the parisneo/lollms application, specifically within the `sanitize_path_from_endpoint` and `sanitize_path` functions in `lollms_core\lollms\security.py`. This vulnerability allows for arbitrary file reading wh...