CVE-2026-1117Improper Access Control in Lollms

Severity
8.2HIGHNVD
EPSS
0.1%
top 75.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 2

Description

A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `generate_msg_from` without implementing authentication or authorization checks. This allows unauthenticated clients to execute resource-intensive or state-altering operations, leading to potential denial of service, state cor

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:HExploitability: 3.9 | Impact: 4.2

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollmsunspecified2.0.0
PyPIlollms/lollms< 2.1.0

🔴Vulnerability Details

2
GHSA
Lollms has an Improper Access Control vulnerability2026-02-02
OSV
Lollms has an Improper Access Control vulnerability2026-02-02

🕵️Threat Intelligence

1
Wiz
CVE-2026-1117 Impact, Exploitability, and Mitigation Steps | Wiz