parisneo/lollms version 9.5 is vulnerable to Local File Inclusion (LFI) attacks due to insufficient path sanitization. The `sanitize_path_from_endpoint` function fails to properly sanitize Windows-style paths (backward slash `\`), allowing attackers to perform directory traversal attacks on Windows systems. This vulnerability can be exploited through various routes, including `personalities` and `/del_preset`, to read or delete any file on the Windows filesystem, compromising the system's availability.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-2181 | parisneo/lollms version 9.5 is vulnerable to Local File Inclusion (LFI) attacks due to insufficient path sanitization. The `sanitize_path_from_endpoint` function fails to properly sanitize Windows-style paths (backward slash `\`), allowing attackers to perform directory traversal attacks on Windows systems. This vulnerability can be exploited through various routes, including `personalities` and `/del_preset`, to read or delete any file on the Windows filesystem, compromising the system's availability. |
![]() |
GHSA-vqwr-q6cc-c242 | parisneo/lollms Local File Inclusion (LFI) attack |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 15 Oct 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-98 |
Wed, 15 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-22 |

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-10-15T12:50:24.257Z
Reserved: 2024-04-29T16:15:21.215Z
Link: CVE-2024-4315

Updated: 2024-08-01T20:40:47.104Z

Status : Awaiting Analysis
Published: 2024-06-12T01:15:49.490
Modified: 2025-10-15T13:15:44.440
Link: CVE-2024-4315

No data.

Updated: 2025-07-13T11:22:16Z