CVE-2026-0560
🟡 Monitoruj
Podatność SSRF w lollms umożliwia atakującym dostęp do wewnętrznych usług i danych.
CVSS
7.5
EPSS
0.1%
Exploit
poc
Vendor
lollms
Opis źródłowy (NVD)
A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints. This vulnerability can lead to internal network access, cloud metadata access, information disclosure, port scanning, and potentially remote code execution.
exploit rce ssrf
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-03-29 18:16:14 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-31 19:37:38 UTC |
Referencje
- https://github.com/parisneo/lollms/commit/76a54f0df2df8a5b254aa627d487b5dc939a0263 (security@huntr.dev) [Patch]
- https://huntr.com/bounties/65e43a5e-b902-4369-b738-1825285a3ea5 (security@huntr.dev) [Exploit, Issue Tracking, Third Party Advisory]