Vulnerability Description
A stored Cross-Site Scripting (XSS) vulnerability exists in the parisneo/lollms-webui application due to improper validation of uploaded files in the profile picture upload functionality. Attackers can exploit this vulnerability by uploading malicious HTML files containing JavaScript code, which is executed when the file is accessed. This vulnerability is remotely exploitable via Cross-Site Request Forgery (CSRF), allowing attackers to perform actions on behalf of authenticated users and potentially leading to unauthorized access to sensitive information within the Lollms-webui application.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lollms | Lollms Web Ui | < 9.5 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/f1adaac0-b9ed-4093-a0f3-2d0a4ecba398ExploitIssue TrackingPatch
- https://huntr.com/bounties/f1adaac0-b9ed-4093-a0f3-2d0a4ecba398ExploitIssue TrackingPatch
FAQ
What is CVE-2024-2299?
CVE-2024-2299 is a vulnerability with a CVSS score of 6.1 (MEDIUM). A stored Cross-Site Scripting (XSS) vulnerability exists in the parisneo/lollms-webui application due to improper validation of uploaded files in the profile picture upload functionality. Attackers ca...
How severe is CVE-2024-2299?
CVE-2024-2299 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2299?
Check the references section above for vendor advisories and patch information. Affected products include: Lollms Lollms Web Ui.