We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-5125

XSS and Open Redirect via SVG File Upload in parisneo/lollms-webui



Description

parisneo/lollms-webui version 9.6 is vulnerable to Cross-Site Scripting (XSS) and Open Redirect due to inadequate input validation and processing of SVG files during the upload process. The XSS vulnerability allows attackers to embed malicious JavaScript code within SVG files, which is executed upon rendering, leading to potential credential theft and unauthorized data access. The Open Redirect vulnerability arises from insufficient URL validation within SVG files, enabling attackers to redirect users to malicious websites, thereby exposing them to phishing attacks, malware distribution, and reputation damage. These vulnerabilities are present in the application's functionality to send files to the AI module.

Reserved 2024-05-19 | Published 2024-11-14 | Updated 2024-11-15 | Assigner @huntr_ai


HIGH: 7.3CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Any version before 9.8
affected

References

huntr.com/bounties/e6ae8cfd-9f8b-41df-a0cc-1e7a47416995

github.com/...ommit/9b0f6c4ad1b9a2cd3466dcefaa278df30feed67e

cve.org (CVE-2024-5125)

nvd.nist.gov (CVE-2024-5125)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-5125

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.