CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
Low
SSVC
Exploitation
poc
Automatable
yes
Technical Impact
partial
An SQL injection vulnerability exists in the delete_discussion()
function of the parisneo/lollms-webui application, allowing an attacker to delete all discussions and message data. The vulnerability is exploitable via a crafted HTTP POST request to the /delete_discussion
endpoint, which internally calls the vulnerable delete_discussion()
function. By sending a specially crafted payload in the ‘id’ parameter, an attacker can manipulate SQL queries to delete all records from the ‘discussion’ and ‘message’ tables. This issue is due to improper neutralization of special elements used in an SQL command.
[
{
"cpes": [
"cpe:2.3:a:parisneo:lollms-webui:9.0:*:*:*:*:*:*:*"
],
"vendor": "parisneo",
"product": "lollms-webui",
"versions": [
{
"status": "affected",
"version": "9.0",
"lessThan": "9.2",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
Low
SSVC
Exploitation
poc
Automatable
yes
Technical Impact
partial