Path Traversal in parisneo/lollms-webui
Description
A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Path traversal in lollms-webui’s list_personalities endpoint allows attackers to enumerate subfolder names by manipulating the category parameter.
Vulnerability
Description
CVE-2024-4330 is a path traversal vulnerability in the parisneo/lollms-webui repository, version 9.6. The flaw resides in the list_personalities endpoint within the endpoints/lollms_advanced.py file. The application fails to properly sanitize user-supplied input for the category parameter, allowing an attacker to traverse directories via a crafted HTTP request [1].
Exploitation
An attacker can exploit this by sending a malicious request where the category parameter contains path traversal sequences (e.g., ../). Successful exploitation reveals the names of subfolders in arbitrary directories, but not the contents of files. The issue was demonstrated by manipulating the category parameter to access directories outside the intended scope [3].
Impact
While only subfolder names are disclosed, this information can aid attackers in mapping the directory structure, potentially leading to further attacks. The vulnerability is classified as low severity due to the limited disclosure, but it violates the principle of least privilege and may expose sensitive paths [1].
Mitigation
As of the publication date (2024-05-30), a patch has not been confirmed. Users of version 9.6 should monitor the official repository [2] for updates and apply any fixes promptly. The issue was reported via a bug bounty platform [3], suggesting the vendor may be working on a resolution.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- ghsa-coords
- parisneo/parisneo/lollms-webuiv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.