Path Traversal in parisneo/lollms-webui
Description
A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the lollms_file_system.py file. The functions add_rag_database, toggle_mount_rag_database, and vectorize_folder do not implement security measures such as sanitize_path_from_endpoint or sanitize_path. This allows an attacker to perform vectorize operations on .sqlite files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A path traversal vulnerability in lollms-webui's file system functions allows attackers to vectorize .sqlite files anywhere on the system, leading to package installation and crashes.
Vulnerability
Overview
CVE-2024-6971 is a path traversal vulnerability in the lollms-webui repository, specifically in the lollms_file_system.py file. The functions add_rag_database, toggle_mount_rag_database, and vectorize_folder fail to implement proper path sanitization measures such as sanitize_path_from_endpoint or sanitize_path [1]. This oversight allows an attacker to specify arbitrary file paths, bypassing intended directory restrictions.
Exploitation
An attacker can exploit this vulnerability by sending crafted requests that target .sqlite files located in any directory on the victim's computer. The lack of input validation means that the vectorize_folder function can be directed to process files outside the intended data store directories [1]. The attack does not require elevated privileges beyond the ability to interact with the web UI's API endpoints.
Impact
Successful exploitation enables the attacker to perform vectorize operations on arbitrary .sqlite files, which can lead to the installation of multiple packages and ultimately cause a crash of the application [1]. This could result in denial of service and potentially allow further compromise depending on the packages installed. The vulnerability was reported via the Huntr bug bounty platform [3].
Mitigation
As of the publication date, no official patch has been released. Users are advised to monitor the repository for updates and apply any security fixes promptly. Restricting network access to the web UI and implementing additional input validation can serve as temporary mitigations.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
lollmsPyPI | <= 9.5.1 | — |
Affected products
2- parisneo/parisneo/lollmsv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.