{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T11:59:52.984","vulnerabilities":[{"cve":{"id":"CVE-2025-6386","sourceIdentifier":"security@huntr.dev","published":"2025-07-07T10:15:29.187","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The parisneo/lollms repository is affected by a timing attack vulnerability in the `authenticate_user` function within the `lollms_authentication.py` file. This vulnerability allows attackers to enumerate valid usernames and guess passwords incrementally by analyzing response time differences. The affected version is the latest, and the issue is resolved in version 20.1. The vulnerability arises from the use of Python's default string equality operator for password comparison, which compares characters sequentially and exits on the first mismatch, leading to variable response times based on the number of matching initial characters."},{"lang":"es","value":"El repositorio parisneo/lollms se ve afectado por una vulnerabilidad de ataque de tiempo en la función `authenticate_user` del archivo `lollms_authentication.py`. Esta vulnerabilidad permite a los atacantes enumerar nombres de usuario válidos y adivinar contraseñas de forma incremental mediante el análisis de las diferencias en los tiempos de respuesta. La versión afectada es la más reciente y el problema se ha resuelto en la versión 20.1. La vulnerabilidad surge del uso del operador de igualdad de cadenas predeterminado de Python para la comparación de contraseñas, que compara caracteres secuencialmente y finaliza con la primera discrepancia, lo que genera tiempos de respuesta variables según el número de caracteres iniciales coincidentes."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-203"}]}],"references":[{"url":"https://github.com/parisneo/lollms/commit/f78437f7b5aa39a78c6201912faf4e0645a38c48","source":"security@huntr.dev"},{"url":"https://huntr.com/bounties/6da05485-d219-4f18-9ffc-991053524b67","source":"security@huntr.dev"}]}}]}