Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2181 | parisneo/lollms version 9.5 is vulnerable to Local File Inclusion (LFI) attacks due to insufficient path sanitization. The `sanitize_path_from_endpoint` function fails to properly sanitize Windows-style paths (backward slash `\`), allowing attackers to perform directory traversal attacks on Windows systems. This vulnerability can be exploited through various routes, including `personalities` and `/del_preset`, to read or delete any file on the Windows filesystem, compromising the system's availability. |
Github GHSA |
GHSA-vqwr-q6cc-c242 | parisneo/lollms Local File Inclusion (LFI) attack |
Wed, 15 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-98 |
Wed, 15 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 |
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-10-15T12:50:24.257Z
Reserved: 2024-04-29T16:15:21.215Z
Link: CVE-2024-4315
Updated: 2024-08-01T20:40:47.104Z
Status : Deferred
Published: 2024-06-12T01:15:49.490
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-4315
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:22:16Z
EUVD
Github GHSA