Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-2356: CWE-29 Path Traversal: '\..\filename' in parisneo parisneo/lollms-webui

0
Critical
VulnerabilityCVE-2024-2356cvecve-2024-2356cwe-29
Published: Mon Feb 02 2026 (02/02/2026, 10:36:23 UTC)
Source: CVE Database V5
Vendor/Project: parisneo
Product: parisneo/lollms-webui

Description

A Local File Inclusion (LFI) vulnerability exists in the '/reinstall_extension' endpoint of the parisneo/lollms-webui application, specifically within the `name` parameter of the `@router.post("/reinstall_extension")` route. This vulnerability allows attackers to inject a malicious `name` parameter, leading to the server loading and executing arbitrary Python files from the upload directory for discussions. This issue arises due to the concatenation of `data.name` directly with `lollmsElfServer.lollms_paths.extensions_zoo_path` and its use as an argument for `ExtensionBuilder().build_extension()`. The server's handling of the `__init__.py` file in arbitrary locations, facilitated by `importlib.machinery.SourceFileLoader`, enables the execution of arbitrary code, such as command execution or creating a reverse-shell connection. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to Remote Code Execution (RCE) when the application is exposed to an external endpoint or the UI, especially when bound to `0.0.0.0` or in `headless mode`. No user interaction is required for exploitation.

AI-Powered Analysis

AILast updated: 02/02/2026, 11:15:22 UTC

Technical Analysis

The vulnerability CVE-2024-2356 in the parisneo/lollms-webui application is a Local File Inclusion (LFI) flaw located in the '/reinstall_extension' POST endpoint. The issue stems from the insecure handling of the 'name' parameter, which is concatenated directly with the internal extensions path (lollmsElfServer.lollms_paths.extensions_zoo_path) without proper sanitization or validation. This concatenated path is then passed to ExtensionBuilder().build_extension(), which uses Python's importlib.machinery.SourceFileLoader to load the '__init__.py' file from the specified directory. Because the input is not sanitized, an attacker can craft a path traversal payload (e.g., '\..\filename') to load and execute arbitrary Python files from the upload directory or other accessible locations. This leads to Remote Code Execution (RCE), allowing attackers to run arbitrary commands or establish reverse shells on the server. The vulnerability is particularly severe when the application is exposed on external interfaces or run in headless mode bound to 0.0.0.0, as it requires no authentication or user interaction to exploit. The CVSS 3.0 base score of 9.6 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation. Although no public exploits have been reported, the vulnerability poses a critical risk to deployments of parisneo/lollms-webui, especially in environments where the application is internet-facing or used in automated workflows.

Potential Impact

For European organizations, this vulnerability poses a significant risk of full system compromise, data theft, and disruption of services. Organizations using parisneo/lollms-webui in production or research environments could have their systems remotely controlled by attackers without any user interaction. This can lead to unauthorized access to sensitive data, manipulation or destruction of data, and potential lateral movement within internal networks. The ability to execute arbitrary code remotely can also facilitate deployment of ransomware or other malware, severely impacting business continuity. Given the increasing adoption of AI and machine learning tools in Europe, especially in sectors like finance, healthcare, and research, exploitation of this vulnerability could have widespread consequences. Additionally, if the application is exposed on public networks or cloud environments, the attack surface increases, making European entities more vulnerable to automated scanning and exploitation attempts.

Mitigation Recommendations

1. Immediately restrict access to the '/reinstall_extension' endpoint by implementing network-level controls such as firewalls or VPNs, ensuring it is not exposed to the public internet. 2. Apply strict input validation and sanitization on the 'name' parameter to prevent path traversal sequences (e.g., '..', '\', '/') before concatenation. 3. Employ application-level whitelisting to allow only known, safe extension names or identifiers. 4. Run the application with the least privileges possible, avoiding running as root or administrator to limit the impact of potential exploitation. 5. Monitor logs for suspicious requests targeting the '/reinstall_extension' endpoint, especially those containing path traversal patterns. 6. If possible, isolate the application in a container or sandbox environment to contain any compromise. 7. Stay updated with vendor patches or security advisories and apply fixes promptly once available. 8. Consider disabling or restricting the functionality of extension reinstallation if not required. 9. Conduct regular security assessments and penetration tests focusing on input validation and code execution vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2024-03-09T21:38:45.783Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 698083b8f9fa50a62f370582

Added to database: 2/2/2026, 11:00:08 AM

Last enriched: 2/2/2026, 11:15:22 AM

Last updated: 2/6/2026, 8:27:13 AM

Views: 207

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats