parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model output data, allowing an attacker to inject malicious JavaScript code. This code can be executed within the user's browser context, enabling the attacker to send a request to the `/execute_code` endpoint and establish a reverse shell to the attacker's host. The issue affects various components of the application, including the handling of user input and model output.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-04-10T17:08:02.423Z

Updated: 2024-08-01T18:48:21.887Z

Reserved: 2024-02-18T00:13:27.756Z

Link: CVE-2024-1602

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:21.887Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-10T17:15:52.537

Modified: 2024-04-10T19:49:51.183

Link: CVE-2024-1602

cve-icon Redhat

No data.