CVE-2024-4881: LoLLMS Path Traversal vulnerability
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.39848%
CWE
Published
6/6/2024
Updated
10/17/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| lollms | pip | < 9.5.0 | 9.5.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper path sanitization in two functions:
- Both functions lacked
path.replace('\\', '/')calls in pre-patch versions, leaving Windows-style paths unnormalized. - The absence of backslash handling allowed bypassing Linux-centric path checks (like
startswith('/')) when deployed on Windows. - The patch explicitly adds backslash normalization to both functions, confirming they were the vulnerability sources.
- The CWE-22/CWE-36 mapping and vulnerability description directly implicate these path-sanitization functions as the failure points.