Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-2288: CWE-352 Cross-Site Request Forgery (CSRF) in parisneo parisneo/lollms-webui

0
High
VulnerabilityCVE-2024-2288cvecve-2024-2288cwe-352
Published: Thu Jun 06 2024 (06/06/2024, 18:24:08 UTC)
Source: CVE Database V5
Vendor/Project: parisneo
Product: parisneo/lollms-webui

Description

A Cross-Site Request Forgery (CSRF) vulnerability exists in the profile picture upload functionality of the Lollms application, specifically in the parisneo/lollms-webui repository, affecting versions up to 7.3.0. This vulnerability allows attackers to change a victim's profile picture without their consent, potentially leading to a denial of service by overloading the filesystem with files. Additionally, this flaw can be exploited to perform a stored cross-site scripting (XSS) attack, enabling attackers to execute arbitrary JavaScript in the context of the victim's browser session. The issue is resolved in version 9.3.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:25:36 UTC

Technical Analysis

CVE-2024-2288 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the profile picture upload functionality of the parisneo/lollms-webui application, specifically affecting versions up to 7.3.0. The vulnerability arises because the application fails to properly verify the origin of requests modifying user profile pictures, allowing attackers to craft malicious web pages that, when visited by authenticated users, trigger unauthorized profile picture changes. This can lead to denial of service by flooding the filesystem with numerous uploaded files, exhausting storage resources. Additionally, the uploaded images can contain malicious payloads that execute stored cross-site scripting (XSS) attacks, enabling attackers to run arbitrary JavaScript in the victim’s browser context. This can compromise user sessions, steal sensitive information, or perform actions on behalf of the user. The vulnerability does not require authentication but does require user interaction (visiting a malicious page). The CVSS v3.0 score is 8.3, reflecting high impact on confidentiality and availability, with low attack complexity. The issue is resolved in version 9.3 of the software. No known exploits are currently reported in the wild. The vulnerability is classified under CWE-352 (CSRF).

Potential Impact

For European organizations, exploitation of CVE-2024-2288 could lead to unauthorized modification of user profiles, potentially damaging organizational reputation and user trust. The denial of service aspect could disrupt services by exhausting filesystem resources, impacting availability of the application. The stored XSS component poses a significant risk to confidentiality and integrity by enabling session hijacking, credential theft, or further exploitation within the victim’s browser. Organizations relying on parisneo/lollms-webui for AI or web UI services may face operational disruptions and data breaches. This is particularly critical for sectors handling sensitive data or providing AI services to clients. The requirement for user interaction means phishing or social engineering could be used to trigger attacks, increasing risk in environments with less user security awareness.

Mitigation Recommendations

The primary mitigation is to upgrade parisneo/lollms-webui to version 9.3 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should implement strict CSRF protections such as anti-CSRF tokens on all state-changing requests, especially the profile picture upload endpoint. Input validation and sanitization should be enforced to prevent malicious payloads in uploaded files. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the upload functionality. User education to avoid clicking on untrusted links can reduce risk of exploitation. Monitoring filesystem usage and upload patterns can help detect abuse attempts early. Additionally, applying Content Security Policy (CSP) headers can mitigate impact of stored XSS by restricting script execution contexts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-03-07T16:40:34.866Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b26178f764e1f470b72

Added to database: 10/15/2025, 1:01:26 PM

Last enriched: 10/15/2025, 1:25:36 PM

Last updated: 10/16/2025, 3:19:50 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats