A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Wed, 09 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Lollms Lollms lollms Web Ui | |
| CPEs | cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:* | |
| Vendors & Products | Lollms Lollms lollms Web Ui | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-02T10:52:32.063Z
Updated: 2024-08-01T19:03:39.289Z
Reserved: 2024-03-04T20:51:54.358Z
Link: CVE-2024-2178
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T19:03:39.289Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-06-02T11:15:07.390
Modified: 2025-07-09T14:25:18.873
Link: CVE-2024-2178
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow