An OS Command Injection vulnerability exists in the '/open_code_folder' endpoint of the parisneo/lollms-webui application, due to improper validation of user-supplied input in the 'discussion_id' parameter. Attackers can exploit this vulnerability by injecting malicious OS commands, leading to unauthorized command execution on the underlying operating system. This could result in unauthorized access, data leakage, or complete system compromise.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-04-10T17:08:02.265Z

Updated: 2024-08-01T18:40:21.354Z

Reserved: 2024-02-14T21:45:35.981Z

Link: CVE-2024-1520

cve-icon Vulnrichment

Updated: 2024-08-01T18:40:21.354Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-10T17:15:51.930

Modified: 2024-04-10T19:49:51.183

Link: CVE-2024-1520

cve-icon Redhat

No data.