Remote Code Execution in create_conda_env function in parisneo/lollms
Description
A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A remote code execution vulnerability in lollms v5.9.0 allows command injection via shell=True in subprocess.Popen.
Vulnerability
Description The vulnerability resides in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The function uses subprocess.Popen with shell=True, which enables shell command injection. An attacker can inject arbitrary commands through the env_name and python_version parameters, leading to remote code execution [1].
Exploitation
Conditions No authentication is required if the function is exposed via an API. The attacker needs to control the input values for env_name or python_version, which are typically provided by the user. The exploit can be triggered by sending crafted HTTP requests to the service endpoint that calls create_conda_env [1].
Impact
Successful exploitation allows an attacker to execute arbitrary OS commands on the server. This could lead to data exfiltration, lateral movement, or complete compromise of the affected system. The example given demonstrates execution of the 'whoami' command, proving code execution capability [1].
Mitigation
Status As of the publication date, version 5.9.0 is affected. The issue was reported via the Huntr bug bounty platform [3]. Users should update to a patched version if available, or avoid exposing the vulnerable function to untrusted input. No official patch has been confirmed at this time.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
lollmsPyPI | <= 9.5.1 | — |
Affected products
2- parisneo/parisneo/lollmsv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.