CVE-2026-0560

HIGH NUCLEI

Server-Side Request Forgery (SSRF) in parisneo/lollms

Title source: cna

Description

A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints. This vulnerability can lead to internal network access, cloud metadata access, information disclosure, port scanning, and potentially remote code execution.

Nuclei Templates (1)

LolLMS < 2.2.0 - Server-Side Request Forgery
HIGHby ritikchaddha
Shodan: http.title:"lollms"

Scores

CVSS v3 7.5
EPSS 0.0189
EPSS Percentile 83.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-918
Status published
Products (2)
lollms/lollms < 2.1.0
parisneo/parisneo/lollms unspecified - 2.2.0
Published Mar 29, 2026
Tracked Since Mar 29, 2026