CVE-2024-2178

A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information.
References
Link Resource
https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e Exploit Third Party Advisory Issue Tracking Patch
https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e Exploit Third Party Advisory Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*

History

09 Jul 2025, 14:25

Type Values Removed Values Added
CPE cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*
First Time Lollms lollms Web Ui
Lollms
References () https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e - () https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e - Exploit, Third Party Advisory, Issue Tracking, Patch

Information

Published : 2024-06-02 11:15

Updated : 2025-07-09 14:25


NVD link : CVE-2024-2178

Mitre link : CVE-2024-2178

CVE.ORG link : CVE-2024-2178


JSON object : View

Products Affected

lollms

  • lollms_web_ui
CWE
CWE-29

Path Traversal: '\..\filename'