VYPR

PyPI package

lollms

pkg:pypi/lollms

Vulnerabilities (19)

  • CVE-2026-1115CriApr 10, 2026
    affected < 2.2.0fixed 2.2.0

    A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the latest version prior to 2.2.0. The vulnerability exists in the `create_post` function within `backend/routers/social/__init__.py`, where user-provided content

  • CVE-2026-1163MedApr 8, 2026
    affected <= 11.0.0

    An insufficient session expiration vulnerability exists in the latest version of parisneo/lollms. The application fails to invalidate active sessions after a password reset, allowing an attacker to continue using an old session token. This issue arises due to the absence of logic

  • CVE-2026-1117HigFeb 2, 2026
    affected < 2.1.0fixed 2.1.0

    A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `gener

  • CVE-2025-6386HigJul 7, 2025
    affected <= 11.0.0

    The parisneo/lollms repository is affected by a timing attack vulnerability in the `authenticate_user` function within the `lollms_authentication.py` file. This vulnerability allows attackers to enumerate valid usernames and guess passwords incrementally by analyzing response tim

  • CVE-2024-6982HigMar 20, 2025
    affected < 11.0.0fixed 11.0.0

    A remote code execution vulnerability exists in the Calculate function of parisneo/lollms version 9.8. The vulnerability arises from the use of Python's `eval()` function to evaluate mathematical expressions within a Python sandbox that disables `__builtins__` and only allows fun

  • CVE-2024-6581Oct 29, 2024
    affected <= 9.5.1

    A vulnerability in the discussion image upload function of the Lollms application, version v9.9, allows for the uploading of SVG files. Due to incomplete filtering in the sanitize_svg function, this can lead to cross-site scripting (XSS) vulnerabilities, which in turn pose a risk

  • CVE-2024-6985Oct 11, 2024
    affected <= 9.5.1

    A path traversal vulnerability exists in the api open_personality_folder endpoint of parisneo/lollms-webui. This vulnerability allows an attacker to read any folder in the personality_folder on the victim's computer, even though sanitize_path is set. The issue arises due to impro

  • CVE-2024-6971Oct 11, 2024
    affected <= 9.5.1

    A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the `lollms_file_system.py` file. The functions `add_rag_database`, `toggle_mount_rag_database`, and `vectorize_folder` do not implement security measures such as `sanitize_path_from_en

  • CVE-2024-6281HigJul 20, 2024
    affected < 9.5.1fixed 9.5.1

    A path traversal vulnerability exists in the `apply_settings` function of parisneo/lollms versions prior to 9.5.1. The `sanitize_path` function does not adequately secure the `discussion_db_name` parameter, allowing attackers to manipulate the path and potentially write to import

  • CVE-2024-6139HigJun 27, 2024
    affected <= 9.5.1

    A path traversal vulnerability exists in the XTTS server of the parisneo/lollms package version v9.6. This vulnerability allows an attacker to write audio files to arbitrary locations on the system and enumerate file paths. The issue arises from improper validation of user-provid

  • CVE-2024-6085HigJun 27, 2024
    affected <= 9.5.1

    A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this

  • CVE-2024-5824HigJun 27, 2024
    affected < 9.5.0fixed 9.5.0

    A path traversal vulnerability in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the `configs/config.yaml` file. This can lead to remote code execution by changing server configuration properties such as `force_accept_remot

  • CVE-2024-3121Jun 24, 2024
    affected <= 9.5.1

    A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulat

  • CVE-2024-5443CriJun 22, 2024
    affected >= 5.9.0, < 9.5.1fixed 9.5.1

    CVE-2024-4320 describes a vulnerability in the parisneo/lollms software, specifically within the `ExtensionBuilder().build_extension()` function. The vulnerability arises from the `/mount_extension` endpoint, where a path traversal issue allows attackers to navigate beyond the in

  • CVE-2024-4315CriJun 12, 2024
    affected < 9.5.0fixed 9.5.0

    parisneo/lollms version 9.5 is vulnerable to Local File Inclusion (LFI) attacks due to insufficient path sanitization. The `sanitize_path_from_endpoint` function fails to properly sanitize Windows-style paths (backward slash `\`), allowing attackers to perform directory traversal

  • CVE-2024-3429Jun 6, 2024
    affected < 9.5.0fixed 9.5.0

    A path traversal vulnerability exists in the parisneo/lollms application, specifically within the `sanitize_path_from_endpoint` and `sanitize_path` functions in `lollms_core\lollms\security.py`. This vulnerability allows for arbitrary file reading when the application is running

  • CVE-2024-4881Jun 6, 2024
    affected < 9.5.0fixed 9.5.0

    A path traversal vulnerability exists in the parisneo/lollms application, affecting version 9.4.0 and potentially earlier versions, but fixed in version 5.9.0. The vulnerability arises due to improper validation of file paths between Windows and Linux environments, allowing attac

  • CVE-2024-4330May 30, 2024

    A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker

  • CVE-2024-4078CriMay 16, 2024
    affected < 9.5.0fixed 9.5.0

    A vulnerability in the parisneo/lollms, specifically in the `/unInstall_binding` endpoint, allows for arbitrary code execution due to insufficient sanitization of user input. The issue arises from the lack of path sanitization when handling the `name` parameter in the `unInstall_