VYPR
High severityNVD Advisory· Published Jun 6, 2024· Updated Aug 1, 2024

Path Traversal in parisneo/lollms

CVE-2024-4881

Description

A path traversal vulnerability exists in the parisneo/lollms application, affecting version 9.4.0 and potentially earlier versions, but fixed in version 5.9.0. The vulnerability arises due to improper validation of file paths between Windows and Linux environments, allowing attackers to traverse beyond the intended directory and read any file on the Windows system. Specifically, the application fails to adequately sanitize file paths containing backslashes (\), which can be exploited to access the root directory and read, or even delete, sensitive files. This issue was discovered in the context of the /user_infos endpoint, where a crafted request using backslashes to reference a file (e.g., \windows\win.ini) could result in unauthorized file access. The impact of this vulnerability includes the potential for attackers to access sensitive information such as environment variables, database files, and configuration files, which could lead to further compromise of the system.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in parisneo/lollms versions 5.9.0 to 9.4.0 allows unauthenticated attackers to read arbitrary files on Windows systems via the /user_infos endpoint.

The parisneo/lollms application, an all-in-one AI solution, is affected by a path traversal vulnerability in versions 5.9.0 through 9.4.0. The root cause is improper sanitization of file paths when handling backslashes (\) on Windows systems [1]. Although the application's description states the vulnerability exists in version 9.4.0 and is fixed in version 5.9.0, the advisory clarifies that versions between 5.9.0 and 9.4.0 are impacted. The flaw manifests in the /user_infos endpoint, where file paths containing backslashes are not adequately validated, allowing directory traversal sequences to escape the intended directory [1].

Exploitation requires no authentication and can be performed over the network by sending a specially crafted request to the vulnerable endpoint. An attacker can supply a path such as \windows\win.ini to traverse outside the application's sandboxed folder and access arbitrary files on the Windows filesystem [1]. This low-complexity attack does not require any special privileges or user interaction, making it trivially exploitable [1].

The impact of successful exploitation includes unauthorized reading of sensitive files, such as environment variables, database files, and configuration files [1]. These could expose credentials, secrets, or other system details that may lead to further compromise of the host system. In some configurations, the same traversal might also allow deletion of files, though the primary risk is information disclosure [1].

A fix was released in version 5.9.0 of the software, which addresses the path traversal by properly sanitizing file paths on Windows [1]. Users running any version between 5.9.0 and 9.4.0 should upgrade to the patched version immediately. The official GitHub repository provides the latest release [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
lollmsPyPI
< 9.5.09.5.0

Affected products

2
  • ghsa-coords
    Range: < 9.5.0
  • parisneo/parisneo/lollmsv5
    Range: unspecified

Patches

1

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.