Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lollms
Lollms lollms |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:lollms:lollms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lollms
Lollms lollms |
|
| Metrics |
cvssV3_1
|
Mon, 30 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Parisneo
Parisneo parisneo/lollms |
|
| Vendors & Products |
Parisneo
Parisneo parisneo/lollms |
Sun, 29 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_active_user)` dependency. This issue can lead to denial of service (DoS) through resource exhaustion, information disclosure, and violation of the application's documented security policies. | |
| Title | Unauthenticated File Upload in parisneo/lollms | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-03-30T15:23:41.471Z
Reserved: 2026-01-01T21:43:51.283Z
Link: CVE-2026-0558
Updated: 2026-03-30T15:23:32.181Z
Status : Analyzed
Published: 2026-03-29T18:16:13.250
Modified: 2026-03-31T19:45:54.220
Link: CVE-2026-0558
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:58:02Z