Description
An insufficient session expiration vulnerability exists in the latest version of parisneo/lollms. The application fails to invalidate active sessions after a password reset, allowing an attacker to continue using an old session token. This issue arises due to the absence of logic to reject requests after a period of inactivity and the excessively long default session duration of 31 days. The vulnerability enables an attacker to maintain persistent access to a compromised account, even after the victim resets their password.
Published: 2026-04-08
Score: 4.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Persistent Unauthorized Access
Action: Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8jg2-726g-xh43 parisneo/lollms has an insufficient session expiration vulnerability
History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Parisneo lollms
Vendors & Products Parisneo lollms

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Parisneo
Parisneo parisneo/lollms
Vendors & Products Parisneo
Parisneo parisneo/lollms

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
Description An insufficient session expiration vulnerability exists in the latest version of parisneo/lollms. The application fails to invalidate active sessions after a password reset, allowing an attacker to continue using an old session token. This issue arises due to the absence of logic to reject requests after a period of inactivity and the excessively long default session duration of 31 days. The vulnerability enables an attacker to maintain persistent access to a compromised account, even after the victim resets their password.
Title Insufficient Session Expiration in parisneo/lollms
Weaknesses CWE-613
References
Metrics cvssV3_0

{'score': 4.1, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

Parisneo Lollms Parisneo/lollms
cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2026-04-08T15:58:36.451Z

Reserved: 2026-01-18T21:30:57.148Z

Link: CVE-2026-1163

cve-icon Vulnrichment

Updated: 2026-04-08T15:58:33.466Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T03:16:07.500

Modified: 2026-04-30T16:16:23.063

Link: CVE-2026-1163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:44:09Z

Weaknesses