Description
A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement proper authorization checks, enabling Insecure Direct Object Reference (IDOR) attacks. Specifically, the `/api/friends/requests/{friendship_id}` endpoint fails to verify whether the authenticated user is part of the friendship or the intended recipient of the request. This vulnerability can lead to unauthorized access, privacy violations, and potential social engineering attacks. The issue has been addressed in version 2.2.0.
Published: 2026-03-29
Score: 8.3 High
EPSS: n/a
KEV: No
Impact: Unauthorized modification of personal friend requests
Action: Patch Now
AI Analysis

Impact

The lollms application suffers from an insecure direct object reference that allows any authenticated user to accept or reject friend requests that belong to other users. The backend route handling these requests does not validate that the caller is a participant of the friendship or the intended recipient, enabling direct manipulation of others’ social connections. This flaw can lead to privacy violations, social engineering opportunities, and potential reputational harm. The weakness corresponds to CWE-863.

Affected Systems

All installations of parisneo/lollms up to and including version 2.2.0 are vulnerable. The issue was addressed in the 2.2.0 release, so any deployment running 2.2.0 or earlier should apply the update.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.3, indicating high severity. EPSS data is unavailable, and the issue is not listed in the KEV catalog, yet the high score reflects that an attacker only needs valid credentials to exploit the flaw. An authenticated user can issue a single HTTP request to the vulnerable endpoint, changing the state of a foreign friend request. Consequently, the risk remains elevated, especially in environments where user accounts may be compromised or malicious insiders exist.

Generated by OpenCVE AI on March 29, 2026 at 20:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official fix by updating to lollms version 2.2.0 or later.
  • Confirm that the respond_request endpoint now enforces that the authenticated user is part of the friendship or the request recipient.
  • Examine activity logs for unusual friend request operations and consider monitoring for similar unauthorized actions.

Generated by OpenCVE AI on March 29, 2026 at 20:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 29 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement proper authorization checks, enabling Insecure Direct Object Reference (IDOR) attacks. Specifically, the `/api/friends/requests/{friendship_id}` endpoint fails to verify whether the authenticated user is part of the friendship or the intended recipient of the request. This vulnerability can lead to unauthorized access, privacy violations, and potential social engineering attacks. The issue has been addressed in version 2.2.0.
Title Insecure Direct Object Reference (IDOR) in parisneo/lollms
Weaknesses CWE-863
References
Metrics cvssV3_0

{'score': 8.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2026-03-29T17:49:44.461Z

Reserved: 2026-01-01T22:48:39.975Z

Link: CVE-2026-0562

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-29T18:16:14.460

Modified: 2026-03-29T18:16:14.460

Link: CVE-2026-0562

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:31:16Z

Weaknesses