Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1117: CWE-284 Improper Access Control in parisneo parisneo/lollms

0
High
VulnerabilityCVE-2026-1117cvecve-2026-1117cwe-284
Published: Mon Feb 02 2026 (02/02/2026, 09:55:26 UTC)
Source: CVE Database V5
Vendor/Project: parisneo
Product: parisneo/lollms

Description

A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `generate_msg_from` without implementing authentication or authorization checks. This allows unauthenticated clients to execute resource-intensive or state-altering operations, leading to potential denial of service, state corruption, and race conditions. Additionally, the use of global flags (`lollmsElfServer.busy`, `lollmsElfServer.cancel_gen`) for state management in a multi-client environment introduces further vulnerabilities, enabling one client's actions to affect the server's state and other clients' operations. The lack of proper access control and reliance on insecure global state management significantly impacts the availability and integrity of the service.

AI-Powered Analysis

AILast updated: 02/02/2026, 10:29:26 UTC

Technical Analysis

CVE-2026-1117 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the parisneo/lollms product, particularly version 5.9.0 and potentially others unspecified. The issue resides in the lollms_generation_events.py module, where the add_events function registers several Socket.IO event handlers such as generate_text, cancel_generation, generate_msg, and generate_msg_from without enforcing any authentication or authorization. This design flaw allows any unauthenticated client connected to the Socket.IO server to invoke these events, which can trigger resource-intensive operations or alter the server's internal state. The vulnerability is worsened by the use of global flags (lollmsElfServer.busy, lollmsElfServer.cancel_gen) for managing server state in a multi-client environment. These global flags are shared across all clients, meaning one client's actions can interfere with others, leading to race conditions and state corruption. The lack of proper access control and insecure state management can cause denial of service by exhausting server resources or corrupting operational state, impacting service availability and integrity. The CVSS v3.0 score is 8.2 (high), reflecting the network attack vector, no required privileges or user interaction, and significant impact on integrity and availability, though confidentiality is not affected. No patches or known exploits are currently documented, but the vulnerability presents a serious risk if exploited.

Potential Impact

For European organizations, the primary impact of CVE-2026-1117 is on service availability and integrity. Organizations relying on parisneo/lollms for critical operations could face denial of service conditions caused by resource exhaustion or corrupted server state, disrupting business continuity. The vulnerability allows unauthenticated attackers to manipulate server state, potentially affecting multiple clients simultaneously due to shared global state flags. This could lead to operational disruptions in collaborative environments or services dependent on lollms. While confidentiality is not directly compromised, the integrity loss and availability impact could affect trust in the service and lead to financial or reputational damage. Sectors such as technology companies, research institutions, or any entity using parisneo/lollms for AI or text generation services in Europe may be particularly vulnerable. The absence of authentication requirements lowers the barrier for exploitation, increasing risk. Additionally, the multi-client state corruption risk could complicate incident response and recovery efforts.

Mitigation Recommendations

European organizations should implement immediate mitigations including: 1) Restricting network access to the Socket.IO server hosting parisneo/lollms to trusted clients only, using network segmentation and firewall rules. 2) Implementing authentication and authorization layers around the Socket.IO event handlers to ensure only authorized users can invoke sensitive events. 3) Avoiding or refactoring the use of global state flags for managing server state in multi-client environments; instead, use client-specific state management to prevent cross-client interference. 4) Monitoring server logs and network traffic for unusual or repeated invocation of generation or cancellation events that may indicate exploitation attempts. 5) Engaging with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 6) Applying rate limiting on event invocations to reduce the risk of resource exhaustion. 7) Conducting thorough security reviews and penetration testing on Socket.IO implementations to identify similar access control weaknesses. These steps go beyond generic advice by focusing on architectural changes and network controls specific to the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2026-01-17T18:09:10.741Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6980792cf9fa50a62f31f217

Added to database: 2/2/2026, 10:15:08 AM

Last enriched: 2/2/2026, 10:29:26 AM

Last updated: 2/3/2026, 3:44:51 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats