Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33340: CWE-306: Missing Authentication for Critical Function in ParisNeo lollms-webui

0
Critical
VulnerabilityCVE-2026-33340cvecve-2026-33340cwe-306cwe-918
Published: Tue Mar 24 2026 (03/24/2026, 15:58:35 UTC)
Source: CVE Database V5
Vendor/Project: ParisNeo
Product: lollms-webui

Description

CVE-2026-33340 is a critical Server-Side Request Forgery (SSRF) vulnerability in the lollms-webui component of ParisNeo's Lord of Large Language and Multi modal Systems. The vulnerability exists in the /api/proxy POST endpoint, which lacks authentication, allowing unauthenticated attackers to make arbitrary GET requests from the server. This can lead to unauthorized access to internal services, local network scanning, and exfiltration of sensitive cloud metadata such as AWS or GCP IAM tokens. No patches are currently available, and the vulnerability has a high CVSS score of 9. 1, indicating severe impact on confidentiality and integrity without requiring authentication or user interaction. Organizations using affected versions are at significant risk of data breaches and internal network compromise. Immediate mitigation involves restricting access to the vulnerable endpoint, implementing network-level controls, and monitoring for suspicious outbound requests. Countries with significant cloud infrastructure adoption and AI research investments are most likely to be targeted.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 16:46:20 UTC

Technical Analysis

CVE-2026-33340 identifies a critical vulnerability in ParisNeo's lollms-webui, a web user interface for managing large language and multimodal AI systems. The vulnerability is a Server-Side Request Forgery (SSRF) flaw located in the /api/proxy POST endpoint, which does not require any authentication (CWE-306: Missing Authentication for Critical Function). This endpoint allows attackers to coerce the server into making arbitrary HTTP GET requests to internal or external resources. Exploiting this flaw, attackers can access internal services that are not exposed externally, perform reconnaissance by scanning local network resources, and extract sensitive cloud metadata such as AWS or GCP IAM tokens, which can lead to further privilege escalation and data exfiltration. The vulnerability affects all known versions up to commit 8c5dcef63d847bb3d027ec74915d8fe4afd3014e, with no patches currently available. The CVSS v3.1 score is 9.1 (critical), reflecting the ease of exploitation (no authentication or user interaction required), and the high impact on confidentiality and integrity. While no known exploits are currently observed in the wild, the potential for severe damage is significant given the nature of the affected systems and the sensitive data at risk.

Potential Impact

The impact of CVE-2026-33340 is substantial for organizations using ParisNeo's lollms-webui, especially those deploying it in cloud environments or within sensitive internal networks. Successful exploitation can lead to unauthorized access to internal services, which may include databases, administrative interfaces, or other critical infrastructure components. Attackers can leverage the SSRF to perform lateral movement within the network, escalate privileges by stealing cloud IAM tokens, and exfiltrate sensitive data. This compromises confidentiality and integrity of organizational data and systems. Additionally, the lack of authentication means any external attacker with network access to the web UI can exploit this vulnerability, increasing the attack surface. The absence of patches further exacerbates the risk, leaving organizations exposed until mitigations are applied. The vulnerability could also be used as a foothold for more complex attacks, including ransomware or espionage campaigns.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict access to the lollms-webui /api/proxy endpoint by enforcing network-level restrictions such as IP whitelisting or VPN-only access. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF payloads targeting internal IP ranges or cloud metadata endpoints (e.g., 169.254.169.254). Implement strict egress filtering on servers hosting lollms-webui to prevent unauthorized outbound HTTP requests to internal or cloud metadata services. Monitor logs for unusual outbound requests or proxy usage patterns indicative of SSRF exploitation attempts. If feasible, disable or remove the vulnerable /api/proxy endpoint until a patch is available. Engage with ParisNeo for updates on patch releases and apply them promptly once available. Additionally, review cloud IAM roles and metadata service configurations to minimize the impact of potential token exposure, such as using instance profiles with least privilege and metadata service access restrictions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T22:15:11.813Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2bc3ff4197a8e3b4e78c2

Added to database: 3/24/2026, 4:30:55 PM

Last enriched: 3/24/2026, 4:46:20 PM

Last updated: 3/24/2026, 5:44:12 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses