CVE-2026-1117
Unauthenticated Access in lollms_generation_events.py Causes DoS
Publication date: 2026-02-02
Last updated on: 2026-02-02
Assigner: huntr.dev
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| parisneo | lollms | 5.9.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the lollms_generation_events.py component of the parisneo/lollms version 5.9.0. It allows unauthenticated users to access sensitive Socket.IO events because the add_events function registers event handlers without authentication or authorization checks. As a result, unauthenticated clients can execute resource-intensive or state-altering operations, which can cause denial of service, state corruption, and race conditions. Additionally, the use of global flags for state management in a multi-client environment allows one client's actions to affect the server's state and other clients' operations, further compromising availability and integrity.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthenticated attackers to perform resource-intensive or state-changing operations on the server, potentially leading to denial of service (making the service unavailable), corruption of the server state, and race conditions. Because global state flags are shared among clients, one attacker can disrupt the service for other users, affecting the availability and integrity of the application.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the lollms project to the latest version where the vulnerability has been addressed. The update involves code cleanup and improvements that likely remove or secure the unauthenticated Socket.IO event handlers. Applying the commit identified by https://github.com/parisneo/lollms/commit/36a5b513dfefe9c2913bf9b618457b4fea603e3b is recommended to reduce the attack surface and improve authentication flows. [1]