Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6040: CWE-352 Cross-Site Request Forgery (CSRF) in parisneo parisneo/lollms

0
Medium
VulnerabilityCVE-2024-6040cvecve-2024-6040cwe-352
Published: Thu Aug 01 2024 (08/01/2024, 15:32:43 UTC)
Source: CVE Database V5
Vendor/Project: parisneo
Product: parisneo/lollms

Description

In parisneo/lollms-webui version v9.8, the lollms_binding_infos is missing the client_id parameter, which leads to multiple security vulnerabilities. Specifically, the endpoints /reload_binding, /install_binding, /reinstall_binding, /unInstall_binding, /set_active_binding_settings, and /update_binding_settings are susceptible to CSRF attacks and local attacks. An attacker can exploit this vulnerability to perform unauthorized actions on the victim's machine.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:38:18 UTC

Technical Analysis

CVE-2024-6040 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the parisneo/lollms-webui software, specifically version v9.8. The root cause is the omission of the client_id parameter in the lollms_binding_infos endpoint, which leads to insufficient request validation on several critical endpoints related to binding management: /reload_binding, /install_binding, /reinstall_binding, /unInstall_binding, /set_active_binding_settings, and /update_binding_settings. These endpoints allow configuration changes and operational commands for bindings within the application. Due to missing CSRF protections, an attacker can craft malicious web requests that, when executed by an authenticated user, cause the application to perform unauthorized actions without the user's consent. The vulnerability does not require prior authentication but does require user interaction (e.g., visiting a malicious webpage). The CVSS 3.0 score of 4.4 reflects a medium severity, with local attack vector and low privileges required. The impact primarily affects the integrity and availability of the application by enabling unauthorized configuration changes or service disruptions. No public exploits are currently known, and no patches have been linked yet. The vulnerability is classified under CWE-352, which covers CSRF weaknesses. This flaw highlights the importance of validating client identifiers and implementing anti-CSRF tokens in web applications managing critical configurations.

Potential Impact

For European organizations deploying parisneo/lollms-webui, this vulnerability could lead to unauthorized modification of binding configurations, potentially disrupting AI/ML workflows or causing denial of service conditions. Integrity of configuration data is at risk, which may result in incorrect model bindings or degraded system performance. Availability could be impacted if bindings are uninstalled or reloaded maliciously. Although the attack requires user interaction, phishing or social engineering could facilitate exploitation. Confidentiality impact is minimal since the vulnerability does not expose sensitive data directly. Organizations relying on this software for AI model management or integration could face operational interruptions, affecting business continuity and service reliability. The medium severity suggests moderate risk but should not be underestimated in environments where AI/ML services are critical. The absence of known exploits provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

To mitigate CVE-2024-6040, organizations should: 1) Implement anti-CSRF tokens on all affected endpoints to ensure requests originate from legitimate sources. 2) Validate the presence and correctness of the client_id parameter in the lollms_binding_infos endpoint and related API calls to prevent unauthorized requests. 3) Restrict access to binding management endpoints through network segmentation, IP whitelisting, or VPN access to reduce exposure. 4) Educate users about phishing risks to minimize the chance of user interaction leading to exploitation. 5) Monitor logs for unusual activity on the affected endpoints, such as unexpected binding changes. 6) Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 7) Consider implementing Web Application Firewalls (WAF) rules to detect and block CSRF attack patterns targeting these endpoints. 8) Regularly review and update security configurations in the web UI to align with best practices for session and request validation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-06-16T14:17:46.463Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2a178f764e1f470d11

Added to database: 10/15/2025, 1:01:30 PM

Last enriched: 10/15/2025, 1:38:18 PM

Last updated: 11/27/2025, 2:42:47 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats