mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/mudler/localai/commit/d02a0f6f01d5c4a926a2d67190cb55d7aca23b66 | Patch |
https://huntr.com/bounties/f91fb287-412e-4c89-87df-9e4b6e609647 | Exploit Third Party Advisory |
Configurations
History
10 Jul 2025, 21:37
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
CPE | cpe:2.3:a:mudler:localai:2.17.1:*:*:*:*:*:*:* | |
First Time |
Mudler
Mudler localai |
|
References | () https://github.com/mudler/localai/commit/d02a0f6f01d5c4a926a2d67190cb55d7aca23b66 - Patch | |
References | () https://huntr.com/bounties/f91fb287-412e-4c89-87df-9e4b6e609647 - Exploit, Third Party Advisory |
27 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-27 16:15
Updated : 2025-07-10 21:37
NVD link : CVE-2024-6983
Mitre link : CVE-2024-6983
JSON object : View
Products Affected
mudler
- localai
CWE
No CWE.