Impact
The LoLLMs WEBUI exposes an API endpoint that allows any user to send a POST request to /api/proxy without authentication. The server processes the request and makes an arbitrary GET request to any URL supplied by the attacker. This Server‑Side Request Forgery can read internal services, enumerate the local network, or harvest cloud metadata such as AWS or GCP IAM tokens, enabling data exfiltration or privilege escalation. The weakness arises from missing authentication checks (CWE‑306) and uncontrolled outbound requests (CWE‑918).
Affected Systems
The flaw exists in all current versions of the lollms‑webui application from ParisNeo. No version exclusions are listed; any deployment of lollms‑webui is potentially vulnerable.
Risk and Exploitability
The CVSS score of 9.1 reflects a severe risk, and the vulnerability is high‑risk due to unauthenticated access. An EPSS score of 16% suggests a moderate probability of exploitation, which, combined with the lack of a current patch and the openness of the endpoint, indicates that attackers could discover and leverage this flaw. As the vulnerability is not yet listed in CISA’s KEV catalog, widespread exploitation may be limited, yet the potential to access sensitive data remains significant. Attackers can trigger the SSRF simply by sending HTTP POST requests to the exposed endpoint from any location with network reach to the server, bypassing authentication entirely.
OpenCVE Enrichment