Description
LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Multi modal Systems. A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in all known existing versions of `lollms-webui`. The `@router.post("/api/proxy")` endpoint allows unauthenticated attackers to force the server into making arbitrary GET requests. This can be exploited to access internal services, scan local networks, or exfiltrate sensitive cloud metadata (e.g., AWS/GCP IAM tokens). As of time of publication, no known patched versions are available.
Published: 2026-03-24
Score: 9.1 Critical
EPSS: 16.3% Moderate
KEV: No
Impact: Server‑Side Request Forgery
Action: Assess Impact
AI Analysis

Impact

The LoLLMs WEBUI exposes an API endpoint that allows any user to send a POST request to /api/proxy without authentication. The server processes the request and makes an arbitrary GET request to any URL supplied by the attacker. This Server‑Side Request Forgery can read internal services, enumerate the local network, or harvest cloud metadata such as AWS or GCP IAM tokens, enabling data exfiltration or privilege escalation. The weakness arises from missing authentication checks (CWE‑306) and uncontrolled outbound requests (CWE‑918).

Affected Systems

The flaw exists in all current versions of the lollms‑webui application from ParisNeo. No version exclusions are listed; any deployment of lollms‑webui is potentially vulnerable.

Risk and Exploitability

The CVSS score of 9.1 reflects a severe risk, and the vulnerability is high‑risk due to unauthenticated access. An EPSS score of 16% suggests a moderate probability of exploitation, which, combined with the lack of a current patch and the openness of the endpoint, indicates that attackers could discover and leverage this flaw. As the vulnerability is not yet listed in CISA’s KEV catalog, widespread exploitation may be limited, yet the potential to access sensitive data remains significant. Attackers can trigger the SSRF simply by sending HTTP POST requests to the exposed endpoint from any location with network reach to the server, bypassing authentication entirely.

Generated by OpenCVE AI on April 15, 2026 at 14:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether a patched release of lollms‑webui has been published. If a fix is available, upgrade immediately.
  • Restrict the /api/proxy endpoint by enabling authentication or limiting access to trusted IP addresses.
  • Impose firewall rules or network segmentation to block the application from contacting internal IP ranges and cloud metadata endpoints.
  • Enable logging for outgoing HTTP requests from the server and set up alerts for unexpected destinations.
  • If the proxy feature is not required, consider disabling or removing it until a fixed version is available.

Generated by OpenCVE AI on April 15, 2026 at 14:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms Web Ui
CPEs cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*
Vendors & Products Lollms
Lollms lollms Web Ui

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Parisneo
Parisneo lollms-webui
Vendors & Products Parisneo
Parisneo lollms-webui

Tue, 24 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Multi modal Systems. A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in all known existing versions of `lollms-webui`. The `@router.post("/api/proxy")` endpoint allows unauthenticated attackers to force the server into making arbitrary GET requests. This can be exploited to access internal services, scan local networks, or exfiltrate sensitive cloud metadata (e.g., AWS/GCP IAM tokens). As of time of publication, no known patched versions are available.
Title LoLLMs WEBUI has unauthenticated Server-Side Request Forgery (SSRF) in /api/proxy endpoint
Weaknesses CWE-306
CWE-918
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Lollms Lollms Web Ui
Parisneo Lollms-webui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T17:30:06.413Z

Reserved: 2026-03-18T22:15:11.813Z

Link: CVE-2026-33340

cve-icon Vulnrichment

Updated: 2026-03-24T17:29:55.871Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T17:16:44.423

Modified: 2026-04-20T20:22:05.330

Link: CVE-2026-33340

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses