CVE-2024-2288: CWE-352 Cross-Site Request Forgery (CSRF) in parisneo parisneo/lollms-webui
A Cross-Site Request Forgery (CSRF) vulnerability exists in the profile picture upload functionality of the Lollms application, specifically in the parisneo/lollms-webui repository, affecting versions up to 7.3.0. This vulnerability allows attackers to change a victim's profile picture without their consent, potentially leading to a denial of service by overloading the filesystem with files. Additionally, this flaw can be exploited to perform a stored cross-site scripting (XSS) attack, enabling attackers to execute arbitrary JavaScript in the context of the victim's browser session. The issue is resolved in version 9.3.
AI Analysis
Technical Summary
CVE-2024-2288 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the profile picture upload functionality of the parisneo/lollms-webui application, specifically affecting versions up to 7.3.0. The vulnerability arises because the application fails to properly verify the origin of requests modifying user profile pictures, allowing attackers to craft malicious web pages that, when visited by authenticated users, trigger unauthorized profile picture changes. This can lead to denial of service by flooding the filesystem with numerous uploaded files, exhausting storage resources. Additionally, the uploaded images can contain malicious payloads that execute stored cross-site scripting (XSS) attacks, enabling attackers to run arbitrary JavaScript in the victim’s browser context. This can compromise user sessions, steal sensitive information, or perform actions on behalf of the user. The vulnerability does not require authentication but does require user interaction (visiting a malicious page). The CVSS v3.0 score is 8.3, reflecting high impact on confidentiality and availability, with low attack complexity. The issue is resolved in version 9.3 of the software. No known exploits are currently reported in the wild. The vulnerability is classified under CWE-352 (CSRF).
Potential Impact
For European organizations, exploitation of CVE-2024-2288 could lead to unauthorized modification of user profiles, potentially damaging organizational reputation and user trust. The denial of service aspect could disrupt services by exhausting filesystem resources, impacting availability of the application. The stored XSS component poses a significant risk to confidentiality and integrity by enabling session hijacking, credential theft, or further exploitation within the victim’s browser. Organizations relying on parisneo/lollms-webui for AI or web UI services may face operational disruptions and data breaches. This is particularly critical for sectors handling sensitive data or providing AI services to clients. The requirement for user interaction means phishing or social engineering could be used to trigger attacks, increasing risk in environments with less user security awareness.
Mitigation Recommendations
The primary mitigation is to upgrade parisneo/lollms-webui to version 9.3 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should implement strict CSRF protections such as anti-CSRF tokens on all state-changing requests, especially the profile picture upload endpoint. Input validation and sanitization should be enforced to prevent malicious payloads in uploaded files. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the upload functionality. User education to avoid clicking on untrusted links can reduce risk of exploitation. Monitoring filesystem usage and upload patterns can help detect abuse attempts early. Additionally, applying Content Security Policy (CSP) headers can mitigate impact of stored XSS by restricting script execution contexts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2024-2288: CWE-352 Cross-Site Request Forgery (CSRF) in parisneo parisneo/lollms-webui
Description
A Cross-Site Request Forgery (CSRF) vulnerability exists in the profile picture upload functionality of the Lollms application, specifically in the parisneo/lollms-webui repository, affecting versions up to 7.3.0. This vulnerability allows attackers to change a victim's profile picture without their consent, potentially leading to a denial of service by overloading the filesystem with files. Additionally, this flaw can be exploited to perform a stored cross-site scripting (XSS) attack, enabling attackers to execute arbitrary JavaScript in the context of the victim's browser session. The issue is resolved in version 9.3.
AI-Powered Analysis
Technical Analysis
CVE-2024-2288 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the profile picture upload functionality of the parisneo/lollms-webui application, specifically affecting versions up to 7.3.0. The vulnerability arises because the application fails to properly verify the origin of requests modifying user profile pictures, allowing attackers to craft malicious web pages that, when visited by authenticated users, trigger unauthorized profile picture changes. This can lead to denial of service by flooding the filesystem with numerous uploaded files, exhausting storage resources. Additionally, the uploaded images can contain malicious payloads that execute stored cross-site scripting (XSS) attacks, enabling attackers to run arbitrary JavaScript in the victim’s browser context. This can compromise user sessions, steal sensitive information, or perform actions on behalf of the user. The vulnerability does not require authentication but does require user interaction (visiting a malicious page). The CVSS v3.0 score is 8.3, reflecting high impact on confidentiality and availability, with low attack complexity. The issue is resolved in version 9.3 of the software. No known exploits are currently reported in the wild. The vulnerability is classified under CWE-352 (CSRF).
Potential Impact
For European organizations, exploitation of CVE-2024-2288 could lead to unauthorized modification of user profiles, potentially damaging organizational reputation and user trust. The denial of service aspect could disrupt services by exhausting filesystem resources, impacting availability of the application. The stored XSS component poses a significant risk to confidentiality and integrity by enabling session hijacking, credential theft, or further exploitation within the victim’s browser. Organizations relying on parisneo/lollms-webui for AI or web UI services may face operational disruptions and data breaches. This is particularly critical for sectors handling sensitive data or providing AI services to clients. The requirement for user interaction means phishing or social engineering could be used to trigger attacks, increasing risk in environments with less user security awareness.
Mitigation Recommendations
The primary mitigation is to upgrade parisneo/lollms-webui to version 9.3 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should implement strict CSRF protections such as anti-CSRF tokens on all state-changing requests, especially the profile picture upload endpoint. Input validation and sanitization should be enforced to prevent malicious payloads in uploaded files. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the upload functionality. User education to avoid clicking on untrusted links can reduce risk of exploitation. Monitoring filesystem usage and upload patterns can help detect abuse attempts early. Additionally, applying Content Security Policy (CSP) headers can mitigate impact of stored XSS by restricting script execution contexts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-03-07T16:40:34.866Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b26178f764e1f470b72
Added to database: 10/15/2025, 1:01:26 PM
Last enriched: 10/15/2025, 1:25:36 PM
Last updated: 10/16/2025, 3:19:50 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61543: n/a
HighCVE-2025-61541: n/a
HighCVE-2025-61536: n/a
HighCVE-2025-41254: CWE-352: Cross-Site Request Forgery (CSRF) in VMware Spring Framework
MediumCVE-2025-36002: Password in Configuration File in IBM Sterling B2B Integrator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.