First published: Thu Nov 14 2024(Updated: )
parisneo/lollms-webui version 9.6 is vulnerable to Cross-Site Scripting (XSS) and Open Redirect due to inadequate input validation and processing of SVG files during the upload process. The XSS vulnerability allows attackers to embed malicious JavaScript code within SVG files, which is executed upon rendering, leading to potential credential theft and unauthorized data access. The Open Redirect vulnerability arises from insufficient URL validation within SVG files, enabling attackers to redirect users to malicious websites, thereby exposing them to phishing attacks, malware distribution, and reputation damage. These vulnerabilities are present in the application's functionality to send files to the AI module.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
parisneo lollms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5125 is considered a high severity vulnerability due to its potential for exploitation through Cross-Site Scripting (XSS) and Open Redirect.
To fix CVE-2024-5125, ensure proper input validation and sanitization of SVG file uploads to prevent the execution of malicious JavaScript.
CVE-2024-5125 contains Cross-Site Scripting (XSS) and Open Redirect vulnerabilities as a result of inadequate input validation.
CVE-2024-5125 affects lollms-webui version 9.6.
The impact of CVE-2024-5125 includes potential execution of malicious scripts that can compromise user data and application integrity.