parisneo/lollms-webui is vulnerable to authentication bypass due to insufficient protection over sensitive endpoints. The application checks if the host parameter is not '0.0.0.0' to restrict access, which is inadequate when the application is bound to a specific interface, allowing unauthorized access to endpoints such as '/restart_program', '/update_software', '/check_update', '/start_recording', and '/stop_recording'. This vulnerability can lead to denial of service, unauthorized disabling or overriding of recordings, and potentially other impacts if certain features are enabled in the configuration.
References
Link | Resource |
---|---|
https://github.com/parisneo/lollms-webui/commit/02e829b5653a1aa5dbbe9413ec84f96caa1274e8 | Patch |
https://huntr.com/bounties/2f769c46-aa85-4ab8-8b08-fe791313b7ba | Exploit Third Party Advisory |
https://github.com/parisneo/lollms-webui/commit/02e829b5653a1aa5dbbe9413ec84f96caa1274e8 | Patch |
https://huntr.com/bounties/2f769c46-aa85-4ab8-8b08-fe791313b7ba | Exploit Third Party Advisory |
Configurations
History
07 Jul 2025, 16:01
Type | Values Removed | Values Added |
---|---|---|
First Time |
Parisneo
Parisneo lollms-webui |
|
References | () https://github.com/parisneo/lollms-webui/commit/02e829b5653a1aa5dbbe9413ec84f96caa1274e8 - Patch | |
References | () https://huntr.com/bounties/2f769c46-aa85-4ab8-8b08-fe791313b7ba - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:* |
Information
Published : 2024-04-16 00:15
Updated : 2025-07-07 16:01
NVD link : CVE-2024-1646
Mitre link : CVE-2024-1646
CVE.ORG link : CVE-2024-1646
JSON object : View
Products Affected
parisneo
- lollms-webui
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel