FKIE_CVE-2026-1117
Vulnerability from fkie_nvd - Published: 2026-02-02 10:16 - Updated: 2026-02-03 16:44
Severity ?
Summary
A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `generate_msg_from` without implementing authentication or authorization checks. This allows unauthenticated clients to execute resource-intensive or state-altering operations, leading to potential denial of service, state corruption, and race conditions. Additionally, the use of global flags (`lollmsElfServer.busy`, `lollmsElfServer.cancel_gen`) for state management in a multi-client environment introduces further vulnerabilities, enabling one client's actions to affect the server's state and other clients' operations. The lack of proper access control and reliance on insecure global state management significantly impacts the availability and integrity of the service.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `generate_msg_from` without implementing authentication or authorization checks. This allows unauthenticated clients to execute resource-intensive or state-altering operations, leading to potential denial of service, state corruption, and race conditions. Additionally, the use of global flags (`lollmsElfServer.busy`, `lollmsElfServer.cancel_gen`) for state management in a multi-client environment introduces further vulnerabilities, enabling one client\u0027s actions to affect the server\u0027s state and other clients\u0027 operations. The lack of proper access control and reliance on insecure global state management significantly impacts the availability and integrity of the service."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el componente \u0027lollms_generation_events.py\u0027 de parisneo/lollms versi\u00f3n 5.9.0 permite acceso no autenticado a eventos sensibles de Socket.IO. La funci\u00f3n \u0027add_events\u0027 registra manejadores de eventos como \u0027generate_text\u0027, \u0027cancel_generation\u0027, \u0027generate_msg\u0027 y \u0027generate_msg_from\u0027 sin implementar comprobaciones de autenticaci\u00f3n o autorizaci\u00f3n. Esto permite a clientes no autenticados ejecutar operaciones que consumen muchos recursos o que alteran el estado, lo que lleva a una potencial denegaci\u00f3n de servicio, corrupci\u00f3n de estado y condiciones de carrera. Adem\u00e1s, el uso de indicadores globales (\u0027lollmsElfServer.busy\u0027, \u0027lollmsElfServer.cancel_gen\u0027) para la gesti\u00f3n de estado en un entorno multi-cliente introduce vulnerabilidades adicionales, permitiendo que las acciones de un cliente afecten el estado del servidor y las operaciones de otros clientes. La falta de un control de acceso adecuado y la dependencia de una gesti\u00f3n de estado global insegura impacta significativamente la disponibilidad y la integridad del servicio."
}
],
"id": "CVE-2026-1117",
"lastModified": "2026-02-03T16:44:36.630",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2,
"source": "security@huntr.dev",
"type": "Secondary"
}
]
},
"published": "2026-02-02T10:16:06.500",
"references": [
{
"source": "security@huntr.dev",
"url": "https://github.com/parisneo/lollms/commit/36a5b513dfefe9c2913bf9b618457b4fea603e3b"
},
{
"source": "security@huntr.dev",
"url": "https://huntr.com/bounties/d2846a7f-0140-4105-b1bb-5ef64ec8b829"
}
],
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "security@huntr.dev",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…