Description
A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the `lollms_file_system.py` file. The functions `add_rag_database`, `toggle_mount_rag_database`, and `vectorize_folder` do not implement security measures such as `sanitize_path_from_endpoint` or `sanitize_path`. This allows an attacker to perform vectorize operations on `.sqlite` files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.
Published: 2024-10-11
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2983 A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the `lollms_file_system.py` file. The functions `add_rag_database`, `toggle_mount_rag_database`, and `vectorize_folder` do not implement security measures such as `sanitize_path_from_endpoint` or `sanitize_path`. This allows an attacker to perform vectorize operations on `.sqlite` files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.
Github GHSA Github GHSA GHSA-7pgr-32fx-c6x9 Lord of Large Language Models (LoLLMs) Server path traversal vulnerability in lollms_file_system.py
History

Fri, 15 Aug 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms-webui
CPEs cpe:2.3:a:parisneo:lollms-webui:9.8:*:*:*:*:*:*:* cpe:2.3:a:lollms:lollms-webui:9.8:*:*:*:*:*:*:*
Vendors & Products Parisneo lollms-webui
Lollms
Lollms lollms-webui

Thu, 03 Jul 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Parisneo lollms-webui
CPEs cpe:2.3:a:parisneo:lollms-webui:9.8:*:*:*:*:*:*:*
Vendors & Products Parisneo lollms-webui
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Parisneo
Parisneo lollms
CPEs cpe:2.3:a:parisneo:lollms:*:*:*:*:*:*:*:*
Vendors & Products Parisneo
Parisneo lollms
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Oct 2024 12:30:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the `lollms_file_system.py` file. The functions `add_rag_database`, `toggle_mount_rag_database`, and `vectorize_folder` do not implement security measures such as `sanitize_path_from_endpoint` or `sanitize_path`. This allows an attacker to perform vectorize operations on `.sqlite` files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.
Title Path Traversal in parisneo/lollms-webui
Weaknesses CWE-22
References
Metrics cvssV3_0

{'score': 3.4, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

Lollms Lollms-webui
Parisneo Lollms
cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-10-11T14:34:23.637Z

Reserved: 2024-07-21T22:56:32.861Z

Link: CVE-2024-6971

cve-icon Vulnrichment

Updated: 2024-10-11T14:34:14.277Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-11T13:15:16.537

Modified: 2025-08-15T20:38:03.347

Link: CVE-2024-6971

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses