LoLLMS vulnerable to Expected Behavior Violation
High severity
GitHub Reviewed
Published
Jul 20, 2024
to the GitHub Advisory Database
•
Updated Oct 15, 2025
Description
Published by the National Vulnerability Database
Jul 20, 2024
Published to the GitHub Advisory Database
Jul 20, 2024
Reviewed
Sep 13, 2024
Last updated
Oct 15, 2025
A path traversal vulnerability exists in the
apply_settingsfunction of parisneo/lollms versions prior to 9.5.1. Thesanitize_pathfunction does not adequately secure thediscussion_db_nameparameter, allowing attackers to manipulate the path and potentially write to important system folders.References