A Cross-Site Request Forgery (CSRF) vulnerability in the parisneo/lollms-webui project allows remote attackers to execute arbitrary code on a victim's system. The vulnerability stems from the `/execute_code` API endpoint, which does not properly validate requests, enabling an attacker to craft a malicious webpage that, when visited by a victim, submits a form to the victim's local lollms-webui instance to execute arbitrary OS commands. This issue allows attackers to take full control of the victim's system without requiring direct network access to the vulnerable application.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://github.com/parisneo/lollms-webui/commit/0b51063119cfb5e391925d232a4af1de9dc32e2b | Patch |
| https://github.com/parisneo/lollms-webui/commit/0b51063119cfb5e391925d232a4af1de9dc32e2b | Patch |
| https://huntr.com/bounties/687cef92-3432-4d6c-af92-868eccabbb71 | Exploit Third Party Advisory Issue Tracking Patch |
| https://huntr.com/bounties/687cef92-3432-4d6c-af92-868eccabbb71 | Exploit Third Party Advisory Issue Tracking Patch |
Configurations
History
15 Aug 2025, 20:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://huntr.com/bounties/687cef92-3432-4d6c-af92-868eccabbb71 - Exploit, Third Party Advisory, Issue Tracking, Patch | |
| CPE | cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:* | |
| First Time |
Lollms
Lollms lollms Web Ui |
30 Jun 2025, 18:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/parisneo/lollms-webui/commit/0b51063119cfb5e391925d232a4af1de9dc32e2b - Patch | |
| References | () https://huntr.com/bounties/687cef92-3432-4d6c-af92-868eccabbb71 - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:* | |
| First Time |
Parisneo lollms-webui
Parisneo |
16 Apr 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | A Cross-Site Request Forgery (CSRF) vulnerability in the parisneo/lollms-webui project allows remote attackers to execute arbitrary code on a victim's system. The vulnerability stems from the `/execute_code` API endpoint, which does not properly validate requests, enabling an attacker to craft a malicious webpage that, when visited by a victim, submits a form to the victim's local lollms-webui instance to execute arbitrary OS commands. This issue allows attackers to take full control of the victim's system without requiring direct network access to the vulnerable application. |
02 Apr 2024, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | The parisneo/lollms-webui does not have CSRF protections. As a result, an attacker is able to execute arbitrary OS commands via the `/execute_code` API endpoint by tricking a user into visiting a specially crafted webpage. |
30 Mar 2024, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-03-30 18:15
Updated : 2025-08-15 20:33
NVD link : CVE-2024-1522
Mitre link : CVE-2024-1522
JSON object : View
Products Affected
lollms
- lollms_web_ui
CWE
No CWE.
