Home » Database

AVID-2026-R1396

Description

Cross-Site Request Forgery (CSRF) Leading to Remote Code Execution in parisneo/lollms-webui (CVE-2024-1522)

Details

A Cross-Site Request Forgery (CSRF) vulnerability in the parisneo/lollms-webui project allows remote attackers to execute arbitrary code on a victim’s system. The vulnerability stems from the /execute_code API endpoint, which does not properly validate requests, enabling an attacker to craft a malicious webpage that, when visited by a victim, submits a form to the victim’s local lollms-webui instance to execute arbitrary OS commands. This issue allows attackers to take full control of the victim’s system without requiring direct network access to the vulnerable application.

Reason for inclusion in AVID: The CVE describes a CSRF leading to remote code execution in the parisneo/lollms-webui web UI, a component commonly used in AI model hosting/inference stacks. This is a software vulnerability in an AI tooling component that could impact general-purpose AI systems, and the report provides explicit CVE details and impact (RCE, CSRF, affected endpoint). This aligns with software supply chain concerns in AI stacks (dependencies/tools used to run AI models).

References

Affected or Relevant Artifacts

  • Developer: parisneo
  • Deployer: parisneo
  • Artifact Details:
TypeName
Systemparisneo/lollms-webui

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score8.8
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionREQUIRED
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-352CWE-352 Cross-Site Request Forgery (CSRF)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-03-30
  • Version: 0.3.3
  • AVID Entry