First published: Thu Mar 20 2025(Updated: )
A vulnerability in parisneo/lollms-webui v13 arises from the server's handling of multipart boundaries in file uploads. The server does not limit or validate the length of the boundary or the characters appended to it, allowing an attacker to craft requests with excessively long boundaries, leading to resource exhaustion and eventual denial of service (DoS). Despite an attempted patch in commit 483431bb, which blocked hyphen characters from being appended to the multipart boundary, the fix is insufficient. The server remains vulnerable if other characters (e.g., '4', 'a') are used instead of hyphens. This allows attackers to exploit the vulnerability using different characters, causing resource exhaustion and service unavailability.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
parisneo lollms | ||
Lollms | =13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1451 is rated as a high severity vulnerability due to its potential to allow crafted requests that could exploit server limitations.
To fix CVE-2025-1451, implement input validation to limit the length and character set of multipart boundaries in file uploads.
CVE-2025-1451 can be exploited to perform Denial of Service attacks or potentially gain unauthorized access through crafted requests.
CVE-2025-1451 affects the parisneo/lollms-webui v13 application.
As of now, specific patch details for CVE-2025-1451 should be checked in the software vendor's updates or security advisories.