Téléchargement de fichier non authentifié dans parisneo/lollms
Plateforme
python
Composant
lollms
Corrigé dans
2.2.0
CVE-2026-0558 is an Unrestricted File Upload vulnerability discovered in lollms, a Python-based project, impacting versions up to 2.2.0. This vulnerability allows unauthenticated users to upload and process arbitrary files via the /api/files/extract-text endpoint, bypassing authentication checks. Successful exploitation can lead to denial of service, information disclosure, and potential security policy breaches. A fix is available in version 2.2.0.
Détecte cette CVE dans ton projet
Téléverse ton fichier requirements.txt et nous te dirons instantanément si tu es affecté.
Impact et Scénarios d'Attaquetraduction en cours…
The primary impact of CVE-2026-0558 is the ability for an unauthenticated attacker to upload and process files without proper authorization. This opens the door to several malicious scenarios. An attacker could upload large files to exhaust server resources, leading to a denial of service (DoS) condition, rendering the lollms application unavailable to legitimate users. Furthermore, the ability to process arbitrary files could allow an attacker to disclose sensitive information contained within those files. The lack of authentication on this endpoint represents a significant security policy violation, as it circumvents intended access controls.
Contexte d'Exploitationtraduction en cours…
CVE-2026-0558 was publicly disclosed on 2026-03-29. Currently, there are no known public proof-of-concept exploits available. The EPSS score is pending evaluation. The vulnerability's simplicity and lack of authentication make it a potential target for opportunistic attackers.
Qui Est à Risquetraduction en cours…
Organizations deploying lollms in production environments, particularly those without robust network segmentation or intrusion detection systems, are at significant risk. Shared hosting environments where multiple users share the same server instance are also particularly vulnerable, as an attacker could potentially compromise the entire environment through this vulnerability.
Étapes de Détectiontraduction en cours…
• python / server:
import requests
url = 'http://your-lollms-server/api/files/extract-text'
files = {'file': open('test.txt', 'rb')}
response = requests.post(url, files=files)
if response.status_code == 200:
print('Potential vulnerability: File upload successful without authentication.')
else:
print('File upload failed.')• linux / server:
journalctl -u lollms -f | grep "/api/files/extract-text"• generic web:
curl -I http://your-lollms-server/api/files/extract-textCheck response headers for lack of authentication requirements.
Chronologie de l'Attaque
- Disclosure
disclosure
Renseignement sur les Menaces
Statut de l'Exploit
EPSS
0.31% (percentile 54%)
CISA SSVC
Vecteur CVSS
Que signifient ces métriques?
- Attack Vector
- Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
- Attack Complexity
- Faible — aucune condition spéciale requise. Exploitable de manière fiable.
- Privileges Required
- Aucun — sans authentification. Aucune identifiant requis pour exploiter.
- User Interaction
- Aucune — attaque automatique et silencieuse. La victime ne fait rien.
- Scope
- Inchangé — impact limité au composant vulnérable.
- Confidentiality
- Aucun — aucun impact sur la confidentialité.
- Integrity
- Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
- Availability
- Aucun — aucun impact sur la disponibilité.
Logiciel Affecté
Classification de Faiblesse (CWE)
Chronologie
- Réservé
- Publiée
- Modifiée
- EPSS mis à jour
Mitigation et Contournementstraduction en cours…
The recommended mitigation for CVE-2026-0558 is to immediately upgrade lollms to version 2.2.0 or later, which includes the necessary authentication checks. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests to the /api/files/extract-text endpoint from unauthenticated users. Additionally, review and strengthen the application's overall authentication and authorization mechanisms. Monitor server logs for suspicious file upload activity, particularly requests originating from unknown or unauthorized sources.
Comment corriger
Mettez à jour la bibliothèque lollms vers une version ultérieure à la 2.2.0. Cela corrigera la vulnérabilité de téléchargement de fichiers non authentifié sur le point de terminaison `/api/files/extract-text`.
Newsletter Sécurité CVE
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
Questions fréquentestraduction en cours…
What is CVE-2026-0558 — Unrestricted File Upload in lollms?
CVE-2026-0558 is a vulnerability in lollms versions up to 2.2.0 that allows unauthenticated users to upload and process files, potentially leading to DoS and information disclosure.
Am I affected by CVE-2026-0558 in lollms?
You are affected if you are running lollms version 2.2.0 or earlier. Verify your version and upgrade immediately.
How do I fix CVE-2026-0558 in lollms?
Upgrade lollms to version 2.2.0 or later. As a temporary workaround, implement a WAF rule to block unauthenticated access to the /api/files/extract-text endpoint.
Is CVE-2026-0558 being actively exploited?
Currently, there are no confirmed reports of active exploitation, but the vulnerability's ease of exploitation makes it a potential target.
Where can I find the official lollms advisory for CVE-2026-0558?
Refer to the lollms project's official repository and security announcements for the latest information: [https://github.com/parisneo/lollms](https://github.com/parisneo/lollms)
Ton projet est-il affecté ?
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.