mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system.
References
Link | Resource |
---|---|
https://github.com/mudler/localai/commit/d02a0f6f01d5c4a926a2d67190cb55d7aca23b66 | Patch |
https://huntr.com/bounties/f91fb287-412e-4c89-87df-9e4b6e609647 | Exploit Third Party Advisory |
Configurations
History
10 Jul 2025, 21:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mudler:localai:2.17.1:*:*:*:*:*:*:* | |
First Time |
Mudler localai
Mudler |
|
References | () https://github.com/mudler/localai/commit/d02a0f6f01d5c4a926a2d67190cb55d7aca23b66 - Patch | |
References | () https://huntr.com/bounties/f91fb287-412e-4c89-87df-9e4b6e609647 - Exploit, Third Party Advisory |
Information
Published : 2024-09-27 16:15
Updated : 2025-07-10 21:37
NVD link : CVE-2024-6983
Mitre link : CVE-2024-6983
CVE.ORG link : CVE-2024-6983
JSON object : View
Products Affected
mudler
- localai
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')