VYPR
High severity8.4GHSA Advisory· Published Mar 20, 2025· Updated Apr 15, 2026

CVE-2024-6982

CVE-2024-6982

Description

A remote code execution vulnerability exists in the Calculate function of parisneo/lollms version 9.8. The vulnerability arises from the use of Python's eval() function to evaluate mathematical expressions within a Python sandbox that disables __builtins__ and only allows functions from the math module. This sandbox can be bypassed by loading the os module using the _frozen_importlib.BuiltinImporter class, allowing an attacker to execute arbitrary commands on the server. The issue is fixed in version 9.10.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A sandbox escape in LoLLMs 9.8 allows remote code execution via Python's eval() by loading the os module through _frozen_importlib.BuiltinImporter.

Vulnerability

Overview

CVE-2024-6982 is a remote code execution (RCE) vulnerability in the Calculate function of parisneo/lollms version 9.8. The flaw arises because the application uses Python's eval() function to evaluate mathematical expressions within a restricted sandbox. Although the sandbox disables __builtins__ and only permits functions from the math module, the restriction is insufficient [1].

Exploitation

Details

An attacker can bypass the sandbox by leveraging the _frozen_importlib.BuiltinImporter class to load the os module. This technique allows the execution of arbitrary system commands through the eval() call, without requiring prior authentication or special privileges. The attack can be mounted remotely, making it accessible to any unauthenticated user sending crafted requests to the vulnerable endpoint [1][3].

Impact

Successful exploitation grants the attacker the ability to execute arbitrary Python code and system commands on the server hosting LoLLMs. This can lead to full compromise of the application, data exfiltration, and potential lateral movement within the network. The CVSS v3 base score of 8.4 (High) reflects the significant impact on confidentiality, integrity, and availability [1].

Mitigation

The issue is fixed in version 9.10 of LoLLMs. Users should upgrade immediately to the patched version. There is no known workaround that completely mitigates the vulnerability without upgrading. Given the ease of exploitation and high impact, organizations using affected versions should prioritize patching [1][2][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
lollmsPyPI
< 11.0.011.0.0

Affected products

3

Patches

1

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.