A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information.
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00249}

epss

{'score': 0.00168}


Wed, 09 Jul 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms Web Ui
CPEs cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*
Vendors & Products Lollms
Lollms lollms Web Ui

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-02T10:52:32.063Z

Updated: 2024-08-01T19:03:39.289Z

Reserved: 2024-03-04T20:51:54.358Z

Link: CVE-2024-2178

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:39.289Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-02T11:15:07.390

Modified: 2025-07-09T14:25:18.873

Link: CVE-2024-2178

cve-icon Redhat

No data.