CVE-2025-6386Observable Discrepancy in Lollms

Severity
7.5HIGHNVD
EPSS
0.1%
top 76.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 7

Description

The parisneo/lollms repository is affected by a timing attack vulnerability in the `authenticate_user` function within the `lollms_authentication.py` file. This vulnerability allows attackers to enumerate valid usernames and guess passwords incrementally by analyzing response time differences. The affected version is the latest, and the issue is resolved in version 20.1. The vulnerability arises from the use of Python's default string equality operator for password comparison, which compares cha

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollmsunspecified20.1
PyPIlollms/lollms11.0.0

🔴Vulnerability Details

2
GHSA
Lord of Large Language Models vulnerable to Observable Discrepancy attack via authenticate_user function2025-07-07
OSV
Lord of Large Language Models vulnerable to Observable Discrepancy attack via authenticate_user function2025-07-07