Safety vulnerability ID: 78789
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the lollms-webui package are vulnerable to Path Traversal due to a lack of path sanitization in functions handling filesystem operations. The functions add_rag_database, toggle_mount_rag_database, and vectorize_folder in lollms_file_system.py do not employ sanitize_path_from_endpoint or sanitize_path, allowing crafted paths with directory traversal sequences. An attacker with local access and sufficient privileges can exploit this by invoking those functions on arbitrary .sqlite files outside the intended directory, potentially triggering unwanted package installations or causing application crashes and disruption.
Latest version: 11.0.0
A python library for AI personality definition
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application