parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model output data, allowing an attacker to inject malicious JavaScript code. This code can be executed within the user's browser context, enabling the attacker to send a request to the `/execute_code` endpoint and establish a reverse shell to the attacker's host. The issue affects various components of the application, including the handling of user input and model output.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Jul 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lollms
Lollms lollms Web Ui |
|
CPEs | cpe:2.3:a:lollms:lollms_web_ui:9.0:*:*:*:*:*:*:* | |
Vendors & Products |
Lollms
Lollms lollms Web Ui |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T18:48:21.887Z
Reserved: 2024-02-18T00:13:27.756Z
Link: CVE-2024-1602

Updated: 2024-08-01T18:48:21.887Z

Status : Analyzed
Published: 2024-04-10T17:15:52.537
Modified: 2025-07-09T14:14:04.560
Link: CVE-2024-1602

No data.