Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1117: CWE-284 Improper Access Control in parisneo parisneo/lollms

0
High
VulnerabilityCVE-2026-1117cvecve-2026-1117cwe-284
Published: Mon Feb 02 2026 (02/02/2026, 09:55:26 UTC)
Source: CVE Database V5
Vendor/Project: parisneo
Product: parisneo/lollms

Description

CVE-2026-1117 is a high-severity vulnerability in the parisneo/lollms software, specifically in the lollms_generation_events. py component. It allows unauthenticated clients to access sensitive Socket. IO events such as generate_text and cancel_generation without any authentication or authorization. This improper access control enables attackers to perform resource-intensive or state-changing operations, potentially causing denial of service, state corruption, and race conditions. The vulnerability is exacerbated by the use of insecure global flags for state management, allowing one client’s actions to impact others. No user interaction or authentication is required to exploit this flaw, making it easily exploitable remotely. The vulnerability impacts the availability and integrity of the service but does not directly affect confidentiality. European organizations using parisneo/lollms are at risk, especially those relying on this software for critical operations. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/09/2026, 10:56:20 UTC

Technical Analysis

CVE-2026-1117 identifies a critical improper access control vulnerability (CWE-284) in the parisneo/lollms project, version 5.9.0 and potentially others. The vulnerability resides in the lollms_generation_events.py module, where several Socket.IO event handlers—generate_text, cancel_generation, generate_msg, and generate_msg_from—are registered without any authentication or authorization mechanisms. This design flaw allows unauthenticated remote clients to invoke these events, which can trigger resource-intensive operations or alter the server’s internal state. The server uses global flags such as lollmsElfServer.busy and lollmsElfServer.cancel_gen to manage state across multiple clients. This global state management approach is insecure in a multi-client environment because one client’s actions can inadvertently affect the processing and state of other clients, leading to race conditions and state corruption. The vulnerability primarily impacts the availability and integrity of the service by enabling denial of service through resource exhaustion or inconsistent server states. The CVSS v3.0 score is 8.2 (high severity), reflecting network attack vector, no privileges or user interaction required, and significant impact on integrity and availability. No patches or fixes are currently linked, and no exploits are known in the wild. The vulnerability demands urgent attention to prevent potential disruption or manipulation of services relying on parisneo/lollms.

Potential Impact

For European organizations, this vulnerability poses a significant risk to service availability and integrity, especially for those deploying parisneo/lollms in production environments or critical workflows. Attackers can remotely trigger resource-intensive operations without authentication, potentially leading to denial of service conditions that disrupt business continuity. The flawed global state management can cause unpredictable behavior affecting multiple users simultaneously, undermining trust in the service and possibly causing data or process inconsistencies. Organizations in sectors such as technology, research, or any domain utilizing parisneo/lollms for AI or text generation services may experience operational disruptions. Additionally, the lack of confidentiality impact means sensitive data leakage is less of a concern, but the integrity and availability impacts alone can cause significant reputational and financial damage. The ease of exploitation and network accessibility increase the threat level, making it critical for European entities to address this vulnerability promptly.

Mitigation Recommendations

To mitigate CVE-2026-1117, organizations should immediately audit all Socket.IO event handlers within parisneo/lollms implementations to ensure authentication and authorization checks are enforced before processing any client requests. Specifically, the add_events function must be updated to include robust access control mechanisms preventing unauthenticated or unauthorized access. Redesigning the server’s state management to avoid reliance on global flags like lollmsElfServer.busy and lollmsElfServer.cancel_gen is essential; adopting per-client state tracking or thread-safe concurrency controls will reduce race conditions and state corruption risks. Network-level controls such as firewall rules or Web Application Firewalls (WAF) can be employed to restrict access to the vulnerable endpoints until patches are available. Monitoring and logging Socket.IO event usage can help detect anomalous or abusive behavior indicative of exploitation attempts. Organizations should also track vendor updates and apply patches promptly once released. Conducting penetration testing focused on Socket.IO event handling can validate the effectiveness of implemented mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2026-01-17T18:09:10.741Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6980792cf9fa50a62f31f217

Added to database: 2/2/2026, 10:15:08 AM

Last enriched: 2/9/2026, 10:56:20 AM

Last updated: 3/20/2026, 3:55:53 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses