CVE-2024-1873: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in parisneo parisneo/lollms-webui
parisneo/lollms-webui is vulnerable to path traversal and denial of service attacks due to an exposed `/select_database` endpoint in version a9d16b0. The endpoint improperly handles file paths, allowing attackers to specify absolute paths when interacting with the `DiscussionsDB` instance. This flaw enables attackers to create directories anywhere on the system where the application has permissions, potentially leading to denial of service by creating directories with names of critical files, such as HTTPS certificate files, causing server startup failures. Additionally, attackers can manipulate the database path, resulting in the loss of client data by constantly changing the file location to an attacker-controlled location, scattering the data across the filesystem and making recovery difficult.
AI Analysis
Technical Summary
CVE-2024-1873 is a path traversal vulnerability classified under CWE-22 affecting the parisneo/lollms-webui project. The vulnerability resides in the /select_database endpoint of version a9d16b0, which improperly validates and restricts file paths provided by users when interacting with the DiscussionsDB instance. Attackers can supply absolute paths, bypassing intended directory restrictions, enabling them to create directories or files anywhere the application has write permissions. This can be exploited to create directories with names matching critical system or application files, such as HTTPS certificate files, leading to denial of service by preventing the server from starting correctly. Furthermore, attackers can manipulate the database path to point to attacker-controlled locations, causing client data to be fragmented and lost, complicating recovery. The vulnerability requires no authentication or user interaction and can be triggered remotely, increasing its risk profile. The CVSS 3.0 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L) reflects high impact on integrity and low impact on availability, with no confidentiality loss. No patches or exploits are currently documented, but the vulnerability's nature demands immediate attention due to the potential for data loss and service disruption.
Potential Impact
For European organizations, the impact of CVE-2024-1873 can be significant, especially for those relying on parisneo/lollms-webui for critical discussion or database management functions. The ability for attackers to manipulate database file paths and create directories arbitrarily can lead to data integrity loss, affecting client trust and compliance with data protection regulations such as GDPR. Denial of service caused by overwriting critical files like HTTPS certificates can disrupt services, impacting business continuity and potentially causing reputational damage. Organizations in sectors with high data sensitivity—such as finance, healthcare, and government—face elevated risks due to the potential loss or scattering of client data. Additionally, recovery from such attacks may require extensive forensic analysis and data restoration efforts, increasing operational costs. The remote and unauthenticated nature of the exploit makes it accessible to a wide range of attackers, increasing the likelihood of exploitation if the software is exposed to the internet or untrusted networks.
Mitigation Recommendations
To mitigate CVE-2024-1873, European organizations should first identify all instances of parisneo/lollms-webui in their environment and assess exposure of the /select_database endpoint. Immediate mitigation steps include implementing strict input validation and sanitization on file path parameters to enforce directory restrictions and prevent absolute path usage. If source code modification is feasible, patch the application to enforce whitelist-based path validation and restrict file system operations to designated safe directories. Network-level controls such as firewall rules or web application firewalls (WAFs) should be configured to restrict access to the vulnerable endpoint to trusted internal networks only. Regular backups of client data and critical configuration files should be maintained to enable recovery in case of data loss or corruption. Monitoring and alerting on unusual file system activity or unexpected directory creations can help detect exploitation attempts early. Finally, coordinate with the vendor or community for official patches or updates and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2024-1873: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in parisneo parisneo/lollms-webui
Description
parisneo/lollms-webui is vulnerable to path traversal and denial of service attacks due to an exposed `/select_database` endpoint in version a9d16b0. The endpoint improperly handles file paths, allowing attackers to specify absolute paths when interacting with the `DiscussionsDB` instance. This flaw enables attackers to create directories anywhere on the system where the application has permissions, potentially leading to denial of service by creating directories with names of critical files, such as HTTPS certificate files, causing server startup failures. Additionally, attackers can manipulate the database path, resulting in the loss of client data by constantly changing the file location to an attacker-controlled location, scattering the data across the filesystem and making recovery difficult.
AI-Powered Analysis
Technical Analysis
CVE-2024-1873 is a path traversal vulnerability classified under CWE-22 affecting the parisneo/lollms-webui project. The vulnerability resides in the /select_database endpoint of version a9d16b0, which improperly validates and restricts file paths provided by users when interacting with the DiscussionsDB instance. Attackers can supply absolute paths, bypassing intended directory restrictions, enabling them to create directories or files anywhere the application has write permissions. This can be exploited to create directories with names matching critical system or application files, such as HTTPS certificate files, leading to denial of service by preventing the server from starting correctly. Furthermore, attackers can manipulate the database path to point to attacker-controlled locations, causing client data to be fragmented and lost, complicating recovery. The vulnerability requires no authentication or user interaction and can be triggered remotely, increasing its risk profile. The CVSS 3.0 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L) reflects high impact on integrity and low impact on availability, with no confidentiality loss. No patches or exploits are currently documented, but the vulnerability's nature demands immediate attention due to the potential for data loss and service disruption.
Potential Impact
For European organizations, the impact of CVE-2024-1873 can be significant, especially for those relying on parisneo/lollms-webui for critical discussion or database management functions. The ability for attackers to manipulate database file paths and create directories arbitrarily can lead to data integrity loss, affecting client trust and compliance with data protection regulations such as GDPR. Denial of service caused by overwriting critical files like HTTPS certificates can disrupt services, impacting business continuity and potentially causing reputational damage. Organizations in sectors with high data sensitivity—such as finance, healthcare, and government—face elevated risks due to the potential loss or scattering of client data. Additionally, recovery from such attacks may require extensive forensic analysis and data restoration efforts, increasing operational costs. The remote and unauthenticated nature of the exploit makes it accessible to a wide range of attackers, increasing the likelihood of exploitation if the software is exposed to the internet or untrusted networks.
Mitigation Recommendations
To mitigate CVE-2024-1873, European organizations should first identify all instances of parisneo/lollms-webui in their environment and assess exposure of the /select_database endpoint. Immediate mitigation steps include implementing strict input validation and sanitization on file path parameters to enforce directory restrictions and prevent absolute path usage. If source code modification is feasible, patch the application to enforce whitelist-based path validation and restrict file system operations to designated safe directories. Network-level controls such as firewall rules or web application firewalls (WAFs) should be configured to restrict access to the vulnerable endpoint to trusted internal networks only. Regular backups of client data and critical configuration files should be maintained to enable recovery in case of data loss or corruption. Monitoring and alerting on unusual file system activity or unexpected directory creations can help detect exploitation attempts early. Finally, coordinate with the vendor or community for official patches or updates and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-02-24T23:17:57.497Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b25178f764e1f470b23
Added to database: 10/15/2025, 1:01:25 PM
Last enriched: 10/15/2025, 1:25:00 PM
Last updated: 10/16/2025, 2:44:59 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41253: CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in VMware Spring Cloud Gateway Server Webflux
HighCVE-2025-54658: Escalation of privilege in Fortinet FortiDLP
HighCVE-2025-53951: Escalation of privilege in Fortinet FortiDLP
MediumCVE-2025-53950: Information disclosure in Fortinet FortiDLP
MediumCVE-2025-46752: Information disclosure in Fortinet FortiDLP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.