First published: Thu Mar 20 2025(Updated: )
A vulnerability in the sanitize_path function in parisneo/lollms-webui v10 - latest allows an attacker to bypass path sanitization by using relative paths such as './'. This can lead to unauthorized access to directories within the personality_folder on the victim's computer.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
parisneo lollms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7058 has been classified as a high-severity vulnerability due to its potential for unauthorized directory access.
To fix CVE-2024-7058, ensure that the path sanitization function correctly handles and rejects relative paths such as './'.
CVE-2024-7058 affects the parusneo/lollms-webui software, specifically version 10 and later.
CVE-2024-7058 can enable attackers to perform unauthorized access to sensitive directories on the victim's system.
As of now, there are no confirmed reports of CVE-2024-7058 being actively exploited, but it poses a serious risk if left unpatched.