{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T20:47:25.371","vulnerabilities":[{"cve":{"id":"CVE-2024-4498","sourceIdentifier":"security@huntr.dev","published":"2024-06-25T20:15:12.127","lastModified":"2025-07-09T14:24:04.403","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A Path Traversal and Remote File Inclusion (RFI) vulnerability exists in the parisneo/lollms-webui application, affecting versions v9.7 to the latest. The vulnerability arises from insufficient input validation in the `/apply_settings` function, allowing an attacker to manipulate the `discussion_db_name` parameter to traverse the file system and include arbitrary files. This issue is compounded by the bypass of input filtering in the `install_binding`, `reinstall_binding`, and `unInstall_binding` endpoints, despite the presence of a `sanitize_path_from_endpoint(data.name)` filter. Successful exploitation enables an attacker to upload and execute malicious code on the victim's system, leading to Remote Code Execution (RCE)."},{"lang":"es","value":"Existe una vulnerabilidad de Path Traversal e inclusión remota de archivos (RFI) en la aplicación parisneo/lollms-webui, que afecta a las versiones v9.7 hasta la última. La vulnerabilidad surge de una validación de entrada insuficiente en la función `/apply_settings`, lo que permite a un atacante manipular el parámetro `discussion_db_name` para atravesar el sistema de archivos e incluir archivos arbitrarios. Este problema se ve agravado por la omisión del filtrado de entrada en los endpoints `install_binding`, `reinstall_binding` y `unInstall_binding`, a pesar de la presencia de un filtro `sanitize_path_from_endpoint(data.name)`. La explotación exitosa permite a un atacante cargar y ejecutar código malicioso en el sistema de la víctima, lo que lleva a la ejecución remota de código (RCE)."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":6.0}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lollms:lollms_web_ui:9.7:*:*:*:*:*:*:*","matchCriteriaId":"1E7E6E82-8963-4DF4-9991-5E9905DD0A7A"}]}]}],"references":[{"url":"https://huntr.com/bounties/9238e88a-a6ca-4915-9b5d-6cdb4148d3f4","source":"security@huntr.dev","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://huntr.com/bounties/9238e88a-a6ca-4915-9b5d-6cdb4148d3f4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"]}]}}]}