{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T05:38:49.509","vulnerabilities":[{"cve":{"id":"CVE-2024-7058","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:36.340","lastModified":"2025-07-08T16:10:59.790","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the sanitize_path function in parisneo/lollms-webui v10 - latest allows an attacker to bypass path sanitization by using relative paths such as './'. This can lead to unauthorized access to directories within the personality_folder on the victim's computer."},{"lang":"es","value":"Una vulnerabilidad en la función sanitize_path de parisneo/lollms-webui v10 (última versión) permite a un atacante eludir la depuración de rutas mediante rutas relativas como \"./\". Esto puede provocar acceso no autorizado a directorios dentro de la carpeta personality_folder en el equipo de la víctima."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-23"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lollms:lollms_web_ui:10:*:*:*:*:*:*:*","matchCriteriaId":"5622185E-495B-47D8-BFB9-35A2EEC3A0B8"}]}]}],"references":[{"url":"https://huntr.com/bounties/148fce03-0f5a-4939-b636-b7f9848765e4","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}