A Local File Inclusion (LFI) vulnerability exists in the parisneo/lollms-webui application, specifically within the `/personalities` route. An attacker can exploit this vulnerability by crafting a URL that includes directory traversal sequences (`../../`) followed by the desired system file path, URL encoded. Successful exploitation allows the attacker to read any file on the filesystem accessible by the web server. This issue arises due to improper control of filename for include/require statement in the application.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Jul 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lollms
Lollms lollms Web Ui |
|
CPEs | cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:* | |
Vendors & Products |
Lollms
Lollms lollms Web Ui |

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T18:48:21.876Z
Reserved: 2024-02-17T01:51:04.301Z
Link: CVE-2024-1600

Updated: 2024-08-01T18:48:21.876Z

Status : Analyzed
Published: 2024-04-10T17:15:52.317
Modified: 2025-07-09T14:14:24.293
Link: CVE-2024-1600

No data.