A remote code execution vulnerability exists in the parisneo/lollms-webui application, specifically within the reinstall_binding functionality in lollms_core/lollms/server/endpoints/lollms_binding_infos.py of the latest version. The vulnerability arises due to insufficient path sanitization, allowing an attacker to exploit path traversal to navigate to arbitrary directories. By manipulating the binding_path to point to a controlled directory and uploading a malicious __init__.py file, an attacker can execute arbitrary code on the server.
References
Link | Resource |
---|---|
https://huntr.com/bounties/63266c77-408b-45ff-962c-8163db50a864 | Exploit Third Party Advisory Issue Tracking Patch |
https://huntr.com/bounties/63266c77-408b-45ff-962c-8163db50a864 | Exploit Third Party Advisory Issue Tracking Patch |
Configurations
History
09 Jul 2025, 14:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:* | |
First Time |
Lollms lollms Web Ui
Lollms |
|
References | () https://huntr.com/bounties/63266c77-408b-45ff-962c-8163db50a864 - Exploit, Third Party Advisory, Issue Tracking, Patch |
Information
Published : 2024-05-16 09:15
Updated : 2025-07-09 14:37
NVD link : CVE-2024-2366
Mitre link : CVE-2024-2366
CVE.ORG link : CVE-2024-2366
JSON object : View
Products Affected
lollms
- lollms_web_ui
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')