mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system.
References
Link | Resource |
---|---|
https://github.com/mudler/localai/commit/d02a0f6f01d5c4a926a2d67190cb55d7aca23b66 | Patch |
https://huntr.com/bounties/f91fb287-412e-4c89-87df-9e4b6e609647 | Exploit Third Party Advisory |
Configurations
History
10 Jul 2025, 21:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mudler:localai:2.17.1:*:*:*:*:*:*:* | |
References | () https://github.com/mudler/localai/commit/d02a0f6f01d5c4a926a2d67190cb55d7aca23b66 - Patch | |
References | () https://huntr.com/bounties/f91fb287-412e-4c89-87df-9e4b6e609647 - Exploit, Third Party Advisory | |
First Time |
Mudler localai
Mudler |
30 Sep 2024, 12:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-27 16:15
Updated : 2025-07-10 21:37
NVD link : CVE-2024-6983
Mitre link : CVE-2024-6983
CVE.ORG link : CVE-2024-6983
JSON object : View
Products Affected
mudler
- localai
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')