parisneo/lollms-webui is vulnerable to authentication bypass due to insufficient protection over sensitive endpoints. The application checks if the host parameter is not '0.0.0.0' to restrict access, which is inadequate when the application is bound to a specific interface, allowing unauthorized access to endpoints such as '/restart_program', '/update_software', '/check_update', '/start_recording', and '/stop_recording'. This vulnerability can lead to denial of service, unauthorized disabling or overriding of recordings, and potentially other impacts if certain features are enabled in the configuration.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-17384 | parisneo/lollms-webui is vulnerable to authentication bypass due to insufficient protection over sensitive endpoints. The application checks if the host parameter is not '0.0.0.0' to restrict access, which is inadequate when the application is bound to a specific interface, allowing unauthorized access to endpoints such as '/restart_program', '/update_software', '/check_update', '/start_recording', and '/stop_recording'. This vulnerability can lead to denial of service, unauthorized disabling or overriding of recordings, and potentially other impacts if certain features are enabled in the configuration. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 15 Aug 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lollms
Lollms lollms-webui |
|
CPEs | cpe:2.3:a:lollms:lollms-webui:*:*:*:*:*:*:*:* | |
Vendors & Products |
Parisneo
Parisneo lollms-webui |
Lollms
Lollms lollms-webui |
Mon, 07 Jul 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Parisneo
Parisneo lollms-webui |
|
CPEs | cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:* | |
Vendors & Products |
Parisneo
Parisneo lollms-webui |

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T18:48:20.668Z
Reserved: 2024-02-19T21:27:04.120Z
Link: CVE-2024-1646

Updated: 2024-08-01T18:48:20.668Z

Status : Analyzed
Published: 2024-04-16T00:15:09.967
Modified: 2025-08-15T20:33:28.890
Link: CVE-2024-1646

No data.

No data.