CVE-2024-2358

CRITICAL

Lollms Web UI < 9.5 - Remote Code Execution

Title source: rule
STIX 2.1

Description

A path traversal vulnerability in the '/apply_settings' endpoint of parisneo/lollms-webui allows attackers to execute arbitrary code. The vulnerability arises due to insufficient sanitization of user-supplied input in the configuration settings, specifically within the 'extensions' parameter. Attackers can exploit this by crafting a payload that includes relative path traversal sequences ('../../../'), enabling them to navigate to arbitrary directories. This flaw subsequently allows the server to load and execute a malicious '__init__.py' file, leading to remote code execution. The issue affects the latest version of parisneo/lollms-webui.

Scores

CVSS v3 9.8
EPSS 0.0316
EPSS Percentile 87.0%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-29
Status published
Products (1)
lollms/lollms_web_ui < 9.5
Published May 16, 2024
Tracked Since Feb 18, 2026