A vulnerability in the `upload_app` function of parisneo/lollms-webui V12 (Strawberry) allows an attacker to delete any file or directory on the system. The function does not implement user input filtering with the `filename` value, causing a Path Traversal error.
References
Link | Resource |
---|---|
https://github.com/parisneo/lollms-webui/commit/dcc078cbe20d2a9640b0942a622134b0e3fa6e48 | Patch |
https://huntr.com/bounties/67ead5b9-8149-4001-a1cd-ac648cb7b414 | Exploit Third Party Advisory |
Configurations
History
08 Jul 2025, 16:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Lollms
Lollms lollms Web Ui |
|
Summary |
|
|
References | () https://github.com/parisneo/lollms-webui/commit/dcc078cbe20d2a9640b0942a622134b0e3fa6e48 - Patch | |
References | () https://huntr.com/bounties/67ead5b9-8149-4001-a1cd-ac648cb7b414 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:lollms:lollms_web_ui:12:*:*:*:*:*:*:* |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-08 16:05
NVD link : CVE-2024-8581
Mitre link : CVE-2024-8581
CVE.ORG link : CVE-2024-8581
JSON object : View
Products Affected
lollms
- lollms_web_ui
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')