CVE-2026-1117
Unknown Unknown - Not Provided
Unauthenticated Access in lollms_generation_events.py Causes DoS

Publication date: 2026-02-02

Last updated on: 2026-02-02

Assigner: huntr.dev

Description
A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `generate_msg_from` without implementing authentication or authorization checks. This allows unauthenticated clients to execute resource-intensive or state-altering operations, leading to potential denial of service, state corruption, and race conditions. Additionally, the use of global flags (`lollmsElfServer.busy`, `lollmsElfServer.cancel_gen`) for state management in a multi-client environment introduces further vulnerabilities, enabling one client's actions to affect the server's state and other clients' operations. The lack of proper access control and reliance on insecure global state management significantly impacts the availability and integrity of the service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-02
Last Modified
2026-02-02
Generated
2026-05-07
AI Q&A
2026-02-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
parisneo lollms 5.9.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the lollms_generation_events.py component of the parisneo/lollms version 5.9.0. It allows unauthenticated users to access sensitive Socket.IO events because the add_events function registers event handlers without authentication or authorization checks. As a result, unauthenticated clients can execute resource-intensive or state-altering operations, which can cause denial of service, state corruption, and race conditions. Additionally, the use of global flags for state management in a multi-client environment allows one client's actions to affect the server's state and other clients' operations, further compromising availability and integrity.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthenticated attackers to perform resource-intensive or state-changing operations on the server, potentially leading to denial of service (making the service unavailable), corruption of the server state, and race conditions. Because global state flags are shared among clients, one attacker can disrupt the service for other users, affecting the availability and integrity of the application.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the lollms project to the latest version where the vulnerability has been addressed. The update involves code cleanup and improvements that likely remove or secure the unauthenticated Socket.IO event handlers. Applying the commit identified by https://github.com/parisneo/lollms/commit/36a5b513dfefe9c2913bf9b618457b4fea603e3b is recommended to reduce the attack surface and improve authentication flows. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart