A Cross-Site Request Forgery (CSRF) vulnerability in the parisneo/lollms-webui project allows remote attackers to execute arbitrary code on a victim's system. The vulnerability stems from the `/execute_code` API endpoint, which does not properly validate requests, enabling an attacker to craft a malicious webpage that, when visited by a victim, submits a form to the victim's local lollms-webui instance to execute arbitrary OS commands. This issue allows attackers to take full control of the victim's system without requiring direct network access to the vulnerable application.
References
Link | Resource |
---|---|
https://github.com/parisneo/lollms-webui/commit/0b51063119cfb5e391925d232a4af1de9dc32e2b | Patch |
https://huntr.com/bounties/687cef92-3432-4d6c-af92-868eccabbb71 | Exploit Third Party Advisory |
https://github.com/parisneo/lollms-webui/commit/0b51063119cfb5e391925d232a4af1de9dc32e2b | Patch |
https://huntr.com/bounties/687cef92-3432-4d6c-af92-868eccabbb71 | Exploit Third Party Advisory |
Configurations
History
30 Jun 2025, 18:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/parisneo/lollms-webui/commit/0b51063119cfb5e391925d232a4af1de9dc32e2b - Patch | |
References | () https://huntr.com/bounties/687cef92-3432-4d6c-af92-868eccabbb71 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:* | |
First Time |
Parisneo lollms-webui
Parisneo |
21 Nov 2024, 08:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/parisneo/lollms-webui/commit/0b51063119cfb5e391925d232a4af1de9dc32e2b - | |
References | () https://huntr.com/bounties/687cef92-3432-4d6c-af92-868eccabbb71 - |
16 Apr 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A Cross-Site Request Forgery (CSRF) vulnerability in the parisneo/lollms-webui project allows remote attackers to execute arbitrary code on a victim's system. The vulnerability stems from the `/execute_code` API endpoint, which does not properly validate requests, enabling an attacker to craft a malicious webpage that, when visited by a victim, submits a form to the victim's local lollms-webui instance to execute arbitrary OS commands. This issue allows attackers to take full control of the victim's system without requiring direct network access to the vulnerable application. |
02 Apr 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) The parisneo/lollms-webui does not have CSRF protections. As a result, an attacker is able to execute arbitrary OS commands via the `/execute_code` API endpoint by tricking a user into visiting a specially crafted webpage. |
30 Mar 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-30 18:15
Updated : 2025-06-30 18:56
NVD link : CVE-2024-1522
Mitre link : CVE-2024-1522
CVE.ORG link : CVE-2024-1522
JSON object : View
Products Affected
parisneo
- lollms-webui
CWE
CWE-352
Cross-Site Request Forgery (CSRF)