CVE-2024-1602

parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model output data, allowing an attacker to inject malicious JavaScript code. This code can be executed within the user's browser context, enabling the attacker to send a request to the `/execute_code` endpoint and establish a reverse shell to the attacker's host. The issue affects various components of the application, including the handling of user input and model output.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:lollms:lollms_web_ui:9.0:*:*:*:*:*:*:*

History

09 Jul 2025, 14:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:lollms:lollms_web_ui:9.0:*:*:*:*:*:*:*
First Time Lollms lollms Web Ui
Lollms
References () https://huntr.com/bounties/59be0d5a-f18e-4418-8f29-72320269a097 - () https://huntr.com/bounties/59be0d5a-f18e-4418-8f29-72320269a097 - Exploit, Third Party Advisory

Information

Published : 2024-04-10 17:15

Updated : 2025-07-09 14:14


NVD link : CVE-2024-1602

Mitre link : CVE-2024-1602

CVE.ORG link : CVE-2024-1602


JSON object : View

Products Affected

lollms

  • lollms_web_ui
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')