Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0560: CWE-918 Server-Side Request Forgery (SSRF) in parisneo parisneo/lollms

0
High
VulnerabilityCVE-2026-0560cvecve-2026-0560cwe-918
Published: Sun Mar 29 2026 (03/29/2026, 17:51:20 UTC)
Source: CVE Database V5
Vendor/Project: parisneo
Product: parisneo/lollms

Description

CVE-2026-0560 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the parisneo/lollms product prior to version 2. 2. 0. It exists in the /api/files/export-content endpoint where the _download_image_to_temp() function fails to properly validate user-supplied URLs. This allows attackers to make arbitrary HTTP requests from the server to internal network services or cloud metadata endpoints, potentially leading to information disclosure, internal network reconnaissance, and possibly remote code execution. The vulnerability requires no authentication or user interaction and can be exploited remotely. Although no known exploits are currently reported in the wild, the impact is significant due to the ability to access sensitive internal resources. Organizations using affected versions should prioritize patching or implementing mitigations to prevent exploitation. Countries with significant deployments of parisneo/lollms or critical cloud infrastructure are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/29/2026, 19:16:47 UTC

Technical Analysis

CVE-2026-0560 is a Server-Side Request Forgery (SSRF) vulnerability identified in the parisneo/lollms software, specifically affecting versions prior to 2.2.0. The flaw resides in the /api/files/export-content endpoint, where the backend function _download_image_to_temp() in backend/routers/files.py does not properly validate URLs provided by users. This lack of validation allows an attacker to craft malicious requests that the server will execute, effectively enabling the attacker to make arbitrary HTTP requests from the vulnerable server to internal network services or cloud metadata endpoints. SSRF vulnerabilities like this can be exploited to bypass network access controls, access sensitive internal resources, perform port scanning on internal networks, and retrieve cloud instance metadata that may contain credentials or configuration data. In some scenarios, SSRF can be leveraged to achieve remote code execution if the internal services are vulnerable or if the attacker can chain this with other vulnerabilities. The CVSS v3.0 score of 7.5 reflects a high severity due to the vulnerability's network attack vector, no required privileges or user interaction, and high impact on confidentiality. No public exploits are currently known, but the vulnerability is published and should be addressed promptly. The vulnerability affects all unspecified versions prior to 2.2.0, and no official patches or mitigation links are provided in the source data, indicating that users must monitor vendor advisories for updates.

Potential Impact

The impact of CVE-2026-0560 is significant for organizations using parisneo/lollms versions prior to 2.2.0. Exploitation can lead to unauthorized internal network access, allowing attackers to probe and interact with internal services that are otherwise inaccessible from the internet. Access to cloud metadata endpoints can expose sensitive credentials, tokens, or configuration details, potentially enabling further compromise of cloud infrastructure. Information disclosure from internal systems can facilitate lateral movement and escalation of privileges within an organization’s environment. Additionally, the ability to perform port scanning internally can aid attackers in mapping the network and identifying additional attack vectors. While remote code execution is a potential risk, it depends on the presence of other vulnerabilities or misconfigurations in internal services. Overall, this vulnerability threatens confidentiality and could indirectly impact integrity and availability if chained with other exploits. Organizations with cloud deployments or complex internal networks are particularly at risk, and exploitation could result in data breaches, service disruptions, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2026-0560, organizations should immediately upgrade parisneo/lollms to version 2.2.0 or later once available, as this version presumably contains the fix. Until a patch is applied, implement strict input validation and sanitization on the /api/files/export-content endpoint to ensure that user-supplied URLs cannot point to internal IP ranges (e.g., 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) or cloud metadata IP addresses (such as 169.254.169.254). Employ network-level controls such as firewall rules or egress filtering to prevent the application server from making outbound requests to internal or sensitive IP ranges. Use web application firewalls (WAFs) to detect and block suspicious SSRF patterns. Monitor logs for unusual outbound requests originating from the vulnerable endpoint. Conduct internal network segmentation to limit the exposure of critical services to the application server. Finally, implement comprehensive cloud security best practices, including restricting metadata service access and using instance roles with least privilege. Regularly review and update security policies to detect and prevent SSRF exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2026-01-01T22:10:15.839Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69c97a88e6bfc5ba1dc86191

Added to database: 3/29/2026, 7:16:24 PM

Last enriched: 3/29/2026, 7:16:47 PM

Last updated: 3/29/2026, 9:43:54 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses