
16/5/2024

21/11/2024
CVE-2024-4326: Remote Code Execution via `/apply_settings` and `/execute_code` in parisneo/lollms-webui
First published: Thu May 16 2024(Updated: )
A vulnerability in parisneo/lollms-webui versions up to 9.3 allows remote attackers to execute arbitrary code. The vulnerability stems from insufficient protection of the `/apply_settings` and `/execute_code` endpoints. Attackers can bypass protections by setting the host to localhost, enabling code execution, and disabling code validation through the `/apply_settings` endpoint. Subsequently, arbitrary commands can be executed remotely via the `/execute_code` endpoint, exploiting the delay in settings enforcement. This issue was addressed in version 9.5.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|
parisneo lollms | <9.5 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-4326?
CVE-2024-4326 is considered a high severity vulnerability allowing remote code execution.
How do I fix CVE-2024-4326?
To fix CVE-2024-4326, upgrade the lollms-webui to version 9.5 or later.
What are the affected versions of CVE-2024-4326?
CVE-2024-4326 affects parisneo/lollms-webui versions up to and including 9.3.
What endpoints are vulnerable in CVE-2024-4326?
CVE-2024-4326 exploits insufficient protection on the /apply_settings and /execute_code endpoints.
Can attackers exploit CVE-2024-4326 remotely?
Yes, CVE-2024-4326 allows remote attackers to execute arbitrary code.
- agent/title
- agent/references
- agent/weakness
- agent/type
- agent/description
- agent/first-publish-date
- agent/severity
- agent/author
- agent/event
- collector/epss-latest
- source/FIRST
- agent/epss
- collector/mitre-cve
- source/MITRE
- collector/nvd-api
- source/NVD
- agent/last-modified-date
- agent/source
- agent/softwarecombine
- agent/tags
- agent/guess-ai
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/parisneo
- canonical/parisneo lollms
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203