A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this protection can be bypassed by changing the root folder to '/'. This allows attackers to read arbitrary files on the system. Additionally, the output folders can be changed to write arbitrary audio files to any location on the system.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2001 A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this protection can be bypassed by changing the root folder to '/'. This allows attackers to read arbitrary files on the system. Additionally, the output folders can be changed to write arbitrary audio files to any location on the system.
Github GHSA Github GHSA GHSA-9chm-m6x2-6fvc lollms vulnerable to path traversal due to unauthenticated root folder settings change
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T21:25:03.365Z

Reserved: 2024-06-17T17:39:09.676Z

Link: CVE-2024-6085

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:03.365Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-27T19:15:19.287

Modified: 2024-11-21T09:48:55.923

Link: CVE-2024-6085

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:24:02Z