Path Traversal in parisneo/lollms
Description
A path traversal vulnerability exists in the parisneo/lollms application, affecting version 9.4.0 and potentially earlier versions, but fixed in version 5.9.0. The vulnerability arises due to improper validation of file paths between Windows and Linux environments, allowing attackers to traverse beyond the intended directory and read any file on the Windows system. Specifically, the application fails to adequately sanitize file paths containing backslashes (\), which can be exploited to access the root directory and read, or even delete, sensitive files. This issue was discovered in the context of the /user_infos endpoint, where a crafted request using backslashes to reference a file (e.g., \windows\win.ini) could result in unauthorized file access. The impact of this vulnerability includes the potential for attackers to access sensitive information such as environment variables, database files, and configuration files, which could lead to further compromise of the system.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A path traversal vulnerability in parisneo/lollms versions 5.9.0 to 9.4.0 allows unauthenticated attackers to read arbitrary files on Windows systems via the /user_infos endpoint.
The parisneo/lollms application, an all-in-one AI solution, is affected by a path traversal vulnerability in versions 5.9.0 through 9.4.0. The root cause is improper sanitization of file paths when handling backslashes (\) on Windows systems [1]. Although the application's description states the vulnerability exists in version 9.4.0 and is fixed in version 5.9.0, the advisory clarifies that versions between 5.9.0 and 9.4.0 are impacted. The flaw manifests in the /user_infos endpoint, where file paths containing backslashes are not adequately validated, allowing directory traversal sequences to escape the intended directory [1].
Exploitation requires no authentication and can be performed over the network by sending a specially crafted request to the vulnerable endpoint. An attacker can supply a path such as \windows\win.ini to traverse outside the application's sandboxed folder and access arbitrary files on the Windows filesystem [1]. This low-complexity attack does not require any special privileges or user interaction, making it trivially exploitable [1].
The impact of successful exploitation includes unauthorized reading of sensitive files, such as environment variables, database files, and configuration files [1]. These could expose credentials, secrets, or other system details that may lead to further compromise of the host system. In some configurations, the same traversal might also allow deletion of files, though the primary risk is information disclosure [1].
A fix was released in version 5.9.0 of the software, which addresses the path traversal by properly sanitizing file paths on Windows [1]. Users running any version between 5.9.0 and 9.4.0 should upgrade to the patched version immediately. The official GitHub repository provides the latest release [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
lollmsPyPI | < 9.5.0 | 9.5.0 |
Affected products
2- parisneo/parisneo/lollmsv5Range: unspecified
Patches
195ad36eeffc6Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.