Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1904 | A path traversal vulnerability exists in the parisneo/lollms application, specifically within the `sanitize_path_from_endpoint` and `sanitize_path` functions in `lollms_core\lollms\security.py`. This vulnerability allows for arbitrary file reading when the application is running on Windows. The issue arises due to insufficient sanitization of user-supplied input, enabling attackers to bypass the path traversal protection mechanisms by crafting malicious input. Successful exploitation could lead to unauthorized access to sensitive files, information disclosure, and potentially a denial of service (DoS) condition by including numerous large or resource-intensive files. This vulnerability affects the latest version prior to 9.6. |
Github GHSA |
GHSA-3x47-w4rx-6pm7 | LoLLMS Path Traversal vulnerability |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 25 Sep 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lollms
Lollms lollms |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:lollms:lollms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lollms
Lollms lollms |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T20:12:06.926Z
Reserved: 2024-04-06T17:53:52.798Z
Link: CVE-2024-3429
Updated: 2024-08-01T20:12:06.926Z
Status : Modified
Published: 2024-06-06T19:16:02.103
Modified: 2024-11-21T09:29:35.220
Link: CVE-2024-3429
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA