parisneo/lollms-webui is vulnerable to authentication bypass due to insufficient protection over sensitive endpoints. The application checks if the host parameter is not '0.0.0.0' to restrict access, which is inadequate when the application is bound to a specific interface, allowing unauthorized access to endpoints such as '/restart_program', '/update_software', '/check_update', '/start_recording', and '/stop_recording'. This vulnerability can lead to denial of service, unauthorized disabling or overriding of recordings, and potentially other impacts if certain features are enabled in the configuration.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://github.com/parisneo/lollms-webui/commit/02e829b5653a1aa5dbbe9413ec84f96caa1274e8 | Patch |
| https://github.com/parisneo/lollms-webui/commit/02e829b5653a1aa5dbbe9413ec84f96caa1274e8 | Patch |
| https://huntr.com/bounties/2f769c46-aa85-4ab8-8b08-fe791313b7ba | Exploit Third Party Advisory |
| https://huntr.com/bounties/2f769c46-aa85-4ab8-8b08-fe791313b7ba | Exploit Third Party Advisory |
Configurations
History
15 Aug 2025, 20:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Lollms
Lollms lollms-webui |
|
| CPE | cpe:2.3:a:lollms:lollms-webui:*:*:*:*:*:*:*:* |
07 Jul 2025, 16:01
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| References | () https://huntr.com/bounties/2f769c46-aa85-4ab8-8b08-fe791313b7ba - Exploit, Third Party Advisory | |
| References | () https://github.com/parisneo/lollms-webui/commit/02e829b5653a1aa5dbbe9413ec84f96caa1274e8 - Patch | |
| First Time |
Parisneo lollms-webui
Parisneo |
|
| CPE | cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:* |
16 Apr 2024, 13:24
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-16 00:15
Updated : 2025-08-15 20:33
NVD link : CVE-2024-1646
Mitre link : CVE-2024-1646
JSON object : View
Products Affected
lollms
- lollms-webui
CWE
No CWE.
