Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lollms
Lollms lollms |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:lollms:lollms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lollms
Lollms lollms |
|
| Metrics |
cvssV3_1
|
Mon, 30 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Parisneo
Parisneo parisneo/lollms |
|
| Vendors & Products |
Parisneo
Parisneo parisneo/lollms |
Sun, 29 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_active_user)` dependency. This issue can lead to denial of service (DoS) through resource exhaustion, information disclosure, and violation of the application's documented security policies. | |
| Title | Unauthenticated File Upload in parisneo/lollms | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-03-30T15:23:41.471Z
Reserved: 2026-01-01T21:43:51.283Z
Link: CVE-2026-0558
Updated: 2026-03-30T15:23:32.181Z
Status : Analyzed
Published: 2026-03-29T18:16:13.250
Modified: 2026-03-31T19:45:54.220
Link: CVE-2026-0558
No data.
OpenCVE Enrichment
Updated: 2026-04-02T07:55:04Z