HIGHCVE-2026-0558CVSS 7.5

Téléchargement de fichier non authentifié dans parisneo/lollms

Plateforme

python

Composant

lollms

Corrigé dans

2.2.0

AI Confidence: highNVDEPSS 0.3%Révisé: mai 2026
Traduction vers votre langue…

CVE-2026-0558 is an Unrestricted File Upload vulnerability discovered in lollms, a Python-based project, impacting versions up to 2.2.0. This vulnerability allows unauthenticated users to upload and process arbitrary files via the /api/files/extract-text endpoint, bypassing authentication checks. Successful exploitation can lead to denial of service, information disclosure, and potential security policy breaches. A fix is available in version 2.2.0.

Python

Détecte cette CVE dans ton projet

Téléverse ton fichier requirements.txt et nous te dirons instantanément si tu es affecté.

Téléverser requirements.txtFormats supportés: requirements.txt · Pipfile.lock

Impact et Scénarios d'Attaquetraduction en cours…

The primary impact of CVE-2026-0558 is the ability for an unauthenticated attacker to upload and process files without proper authorization. This opens the door to several malicious scenarios. An attacker could upload large files to exhaust server resources, leading to a denial of service (DoS) condition, rendering the lollms application unavailable to legitimate users. Furthermore, the ability to process arbitrary files could allow an attacker to disclose sensitive information contained within those files. The lack of authentication on this endpoint represents a significant security policy violation, as it circumvents intended access controls.

Contexte d'Exploitationtraduction en cours…

CVE-2026-0558 was publicly disclosed on 2026-03-29. Currently, there are no known public proof-of-concept exploits available. The EPSS score is pending evaluation. The vulnerability's simplicity and lack of authentication make it a potential target for opportunistic attackers.

Qui Est à Risquetraduction en cours…

Organizations deploying lollms in production environments, particularly those without robust network segmentation or intrusion detection systems, are at significant risk. Shared hosting environments where multiple users share the same server instance are also particularly vulnerable, as an attacker could potentially compromise the entire environment through this vulnerability.

Étapes de Détectiontraduction en cours…

• python / server:

import requests

url = 'http://your-lollms-server/api/files/extract-text'
files = {'file': open('test.txt', 'rb')}
response = requests.post(url, files=files)

if response.status_code == 200:
    print('Potential vulnerability: File upload successful without authentication.')
else:
    print('File upload failed.')

• linux / server:

journalctl -u lollms -f | grep "/api/files/extract-text"

• generic web:

curl -I http://your-lollms-server/api/files/extract-text

Check response headers for lack of authentication requirements.

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée
Rapports1 rapport de menace

EPSS

0.31% (percentile 54%)

CISA SSVC

Exploitationpoc
Automatisableyes
Impact Techniquepartial

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N7.5HIGHAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredNoneNiveau d'authentification requisUser InteractionNoneSi une action de la victime est requiseScopeUnchangedImpact au-delà du composant affectéConfidentialityNoneRisque d'exposition de données sensiblesIntegrityHighRisque de modification non autorisée de donnéesAvailabilityNoneRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Aucun — sans authentification. Aucune identifiant requis pour exploiter.
User Interaction
Aucune — attaque automatique et silencieuse. La victime ne fait rien.
Scope
Inchangé — impact limité au composant vulnérable.
Confidentiality
Aucun — aucun impact sur la confidentialité.
Integrity
Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
Availability
Aucun — aucun impact sur la disponibilité.

Logiciel Affecté

Composantlollms
Fournisseurparisneo
Plage affectéeCorrigé dans
unspecified – 2.2.02.2.0

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. Modifiée
  4. EPSS mis à jour
Corrigé -974 jours après la divulgation

Mitigation et Contournementstraduction en cours…

The recommended mitigation for CVE-2026-0558 is to immediately upgrade lollms to version 2.2.0 or later, which includes the necessary authentication checks. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests to the /api/files/extract-text endpoint from unauthenticated users. Additionally, review and strengthen the application's overall authentication and authorization mechanisms. Monitor server logs for suspicious file upload activity, particularly requests originating from unknown or unauthorized sources.

Comment corriger

Mettez à jour la bibliothèque lollms vers une version ultérieure à la 2.2.0. Cela corrigera la vulnérabilité de téléchargement de fichiers non authentifié sur le point de terminaison `/api/files/extract-text`.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2026-0558 — Unrestricted File Upload in lollms?

CVE-2026-0558 is a vulnerability in lollms versions up to 2.2.0 that allows unauthenticated users to upload and process files, potentially leading to DoS and information disclosure.

Am I affected by CVE-2026-0558 in lollms?

You are affected if you are running lollms version 2.2.0 or earlier. Verify your version and upgrade immediately.

How do I fix CVE-2026-0558 in lollms?

Upgrade lollms to version 2.2.0 or later. As a temporary workaround, implement a WAF rule to block unauthenticated access to the /api/files/extract-text endpoint.

Is CVE-2026-0558 being actively exploited?

Currently, there are no confirmed reports of active exploitation, but the vulnerability's ease of exploitation makes it a potential target.

Where can I find the official lollms advisory for CVE-2026-0558?

Refer to the lollms project's official repository and security announcements for the latest information: [https://github.com/parisneo/lollms](https://github.com/parisneo/lollms)

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.