CVE-2024-6250
HIGH EXPLOITED NUCLEIparisneo/lollms-webui <9.6 - Path Traversal
Title source: llmDescription
An absolute path traversal vulnerability exists in parisneo/lollms-webui v9.6, specifically in the `open_file` endpoint of `lollms_advanced.py`. The `sanitize_path` function with `allow_absolute_path=True` allows an attacker to access arbitrary files and directories on a Windows system. This vulnerability can be exploited to read any file and list arbitrary directories on the affected system.
Nuclei Templates (1)
LOLLMS WebUI - Absolute Path Traversal
HIGHby ritikchaddha
Scores
CVSS v3
7.5
EPSS
0.1125
EPSS Percentile
93.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2026-02-20
CWE
CWE-36
Status
published
Products (1)
lollms/lollms_web_ui
9.6
Published
Jun 27, 2024
Tracked Since
Feb 18, 2026