CVE-2026-0558: CWE-287 Improper Authentication in parisneo parisneo/lollms
CVE-2026-0558 is a high-severity improper authentication vulnerability in the parisneo/lollms application, up to version 2. 2. 0. The vulnerability exists because the `/api/files/extract-text` endpoint does not require authentication, unlike other file-related endpoints, allowing unauthenticated users to upload and process files. This flaw can be exploited to cause denial of service via resource exhaustion and may lead to information disclosure and violation of security policies. The vulnerability is classified under CWE-287 (Improper Authentication) and has a CVSS 3. 0 score of 7. 5, indicating a significant risk. No known exploits are currently reported in the wild, and no patches have been linked yet. Organizations using parisneo/lollms should prioritize restricting access to this endpoint and monitor for unusual file processing activity.
AI Analysis
Technical Summary
CVE-2026-0558 identifies an improper authentication vulnerability in the parisneo/lollms software, specifically affecting versions up to and including 2.2.0. The root cause is that the `/api/files/extract-text` REST API endpoint lacks the authentication dependency `Depends(get_current_active_user)` that is present in other file-related endpoints. This omission allows unauthenticated users to upload files and trigger text extraction processes without any access control. The vulnerability falls under CWE-287, which concerns failures in enforcing proper authentication mechanisms. Exploiting this flaw, an attacker can submit large or numerous files to exhaust server resources, leading to denial of service conditions. Additionally, the lack of authentication may allow unauthorized access to sensitive data processed or returned by the endpoint, violating the application's security policies. The CVSS v3.0 base score of 7.5 reflects a high severity, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. Although no public exploits are known, the vulnerability presents a significant risk due to its ease of exploitation and potential impact on data integrity and service reliability.
Potential Impact
The vulnerability can have severe consequences for organizations deploying parisneo/lollms. Unauthenticated access to the file extraction endpoint can lead to denial of service through resource exhaustion, potentially disrupting critical services relying on the application. Information disclosure risks arise if sensitive data is processed or returned without proper access controls, undermining confidentiality and trust. The violation of documented security policies can expose organizations to compliance and regulatory risks. Attackers could manipulate the system to inject malicious files or corrupt data, impacting the integrity of the application and its outputs. Given the network-accessible nature of the vulnerability and no requirement for authentication or user interaction, the attack surface is broad, increasing the likelihood of exploitation. This can affect organizations in sectors relying on parisneo/lollms for file processing, including technology, research, and any domain using this software for document analysis or AI-related tasks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the `/api/files/extract-text` endpoint by implementing proper authentication and authorization controls, ideally matching the protections applied to other file-related endpoints. Applying the missing `Depends(get_current_active_user)` dependency or equivalent authentication middleware is critical. Network-level controls such as IP whitelisting or VPN access can further limit exposure. Rate limiting and file size restrictions should be enforced to prevent resource exhaustion attacks. Monitoring and logging of file upload and extraction activities can help detect anomalous behavior early. Until an official patch is released, consider deploying a web application firewall (WAF) with custom rules to block unauthenticated requests to this endpoint. Regularly check for vendor updates or security advisories to apply patches promptly once available.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Japan, South Korea, India, Netherlands
CVE-2026-0558: CWE-287 Improper Authentication in parisneo parisneo/lollms
Description
CVE-2026-0558 is a high-severity improper authentication vulnerability in the parisneo/lollms application, up to version 2. 2. 0. The vulnerability exists because the `/api/files/extract-text` endpoint does not require authentication, unlike other file-related endpoints, allowing unauthenticated users to upload and process files. This flaw can be exploited to cause denial of service via resource exhaustion and may lead to information disclosure and violation of security policies. The vulnerability is classified under CWE-287 (Improper Authentication) and has a CVSS 3. 0 score of 7. 5, indicating a significant risk. No known exploits are currently reported in the wild, and no patches have been linked yet. Organizations using parisneo/lollms should prioritize restricting access to this endpoint and monitor for unusual file processing activity.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-0558 identifies an improper authentication vulnerability in the parisneo/lollms software, specifically affecting versions up to and including 2.2.0. The root cause is that the `/api/files/extract-text` REST API endpoint lacks the authentication dependency `Depends(get_current_active_user)` that is present in other file-related endpoints. This omission allows unauthenticated users to upload files and trigger text extraction processes without any access control. The vulnerability falls under CWE-287, which concerns failures in enforcing proper authentication mechanisms. Exploiting this flaw, an attacker can submit large or numerous files to exhaust server resources, leading to denial of service conditions. Additionally, the lack of authentication may allow unauthorized access to sensitive data processed or returned by the endpoint, violating the application's security policies. The CVSS v3.0 base score of 7.5 reflects a high severity, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. Although no public exploits are known, the vulnerability presents a significant risk due to its ease of exploitation and potential impact on data integrity and service reliability.
Potential Impact
The vulnerability can have severe consequences for organizations deploying parisneo/lollms. Unauthenticated access to the file extraction endpoint can lead to denial of service through resource exhaustion, potentially disrupting critical services relying on the application. Information disclosure risks arise if sensitive data is processed or returned without proper access controls, undermining confidentiality and trust. The violation of documented security policies can expose organizations to compliance and regulatory risks. Attackers could manipulate the system to inject malicious files or corrupt data, impacting the integrity of the application and its outputs. Given the network-accessible nature of the vulnerability and no requirement for authentication or user interaction, the attack surface is broad, increasing the likelihood of exploitation. This can affect organizations in sectors relying on parisneo/lollms for file processing, including technology, research, and any domain using this software for document analysis or AI-related tasks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the `/api/files/extract-text` endpoint by implementing proper authentication and authorization controls, ideally matching the protections applied to other file-related endpoints. Applying the missing `Depends(get_current_active_user)` dependency or equivalent authentication middleware is critical. Network-level controls such as IP whitelisting or VPN access can further limit exposure. Rate limiting and file size restrictions should be enforced to prevent resource exhaustion attacks. Monitoring and logging of file upload and extraction activities can help detect anomalous behavior early. Until an official patch is released, consider deploying a web application firewall (WAF) with custom rules to block unauthenticated requests to this endpoint. Regularly check for vendor updates or security advisories to apply patches promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2026-01-01T21:43:51.283Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 69c97a88e6bfc5ba1dc8618d
Added to database: 3/29/2026, 7:16:24 PM
Last enriched: 3/29/2026, 7:16:35 PM
Last updated: 3/29/2026, 9:33:02 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.