parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model output data, allowing an attacker to inject malicious JavaScript code. This code can be executed within the user's browser context, enabling the attacker to send a request to the `/execute_code` endpoint and establish a reverse shell to the attacker's host. The issue affects various components of the application, including the handling of user input and model output.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 09 Jul 2025 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Lollms Lollms lollms Web Ui | |
| CPEs | cpe:2.3:a:lollms:lollms_web_ui:9.0:*:*:*:*:*:*:* | |
| Vendors & Products | Lollms Lollms lollms Web Ui | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-04-10T17:08:02.423Z
Updated: 2024-08-01T18:48:21.887Z
Reserved: 2024-02-18T00:13:27.756Z
Link: CVE-2024-1602
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T18:48:21.887Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-04-10T17:15:52.537
Modified: 2025-07-09T14:14:04.560
Link: CVE-2024-1602
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow