Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2983 | A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the `lollms_file_system.py` file. The functions `add_rag_database`, `toggle_mount_rag_database`, and `vectorize_folder` do not implement security measures such as `sanitize_path_from_endpoint` or `sanitize_path`. This allows an attacker to perform vectorize operations on `.sqlite` files in any directory on the victim's computer, potentially installing multiple packages and causing a crash. |
Github GHSA |
GHSA-7pgr-32fx-c6x9 | Lord of Large Language Models (LoLLMs) Server path traversal vulnerability in lollms_file_system.py |
Fri, 15 Aug 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lollms
Lollms lollms-webui |
|
| CPEs | cpe:2.3:a:lollms:lollms-webui:9.8:*:*:*:*:*:*:* | |
| Vendors & Products |
Parisneo lollms-webui
|
Lollms
Lollms lollms-webui |
Thu, 03 Jul 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Parisneo lollms-webui
|
|
| CPEs | cpe:2.3:a:parisneo:lollms-webui:9.8:*:*:*:*:*:*:* | |
| Vendors & Products |
Parisneo lollms-webui
|
|
| Metrics |
cvssV3_1
|
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Parisneo
Parisneo lollms |
|
| CPEs | cpe:2.3:a:parisneo:lollms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Parisneo
Parisneo lollms |
|
| Metrics |
ssvc
|
Fri, 11 Oct 2024 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the `lollms_file_system.py` file. The functions `add_rag_database`, `toggle_mount_rag_database`, and `vectorize_folder` do not implement security measures such as `sanitize_path_from_endpoint` or `sanitize_path`. This allows an attacker to perform vectorize operations on `.sqlite` files in any directory on the victim's computer, potentially installing multiple packages and causing a crash. | |
| Title | Path Traversal in parisneo/lollms-webui | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-10-11T14:34:23.637Z
Reserved: 2024-07-21T22:56:32.861Z
Link: CVE-2024-6971
Updated: 2024-10-11T14:34:14.277Z
Status : Analyzed
Published: 2024-10-11T13:15:16.537
Modified: 2025-08-15T20:38:03.347
Link: CVE-2024-6971
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA