A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lollms
Lollms lollms Web Ui |
|
CPEs | cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:* | |
Vendors & Products |
Lollms
Lollms lollms Web Ui |

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T20:12:07.326Z
Reserved: 2024-04-07T11:42:39.367Z
Link: CVE-2024-3435

Updated: 2024-08-01T20:12:07.326Z

Status : Analyzed
Published: 2024-05-16T09:15:14.290
Modified: 2025-07-09T14:33:50.620
Link: CVE-2024-3435

No data.