CVE-2026-0560
SSRF in parisneo/lollms `/api/files/export-content` Enables Internal Access
Publication date: 2026-03-29
Last updated on: 2026-03-31
Assigner: huntr.dev
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lollms | lollms | to 2.1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Server-Side Request Forgery (SSRF) found in the parisneo/lollms software versions before 2.2.0. It occurs in the `/api/files/export-content` endpoint, specifically in the `_download_image_to_temp()` function. The function does not properly validate URLs provided by users, which allows attackers to make arbitrary HTTP requests from the server to internal network services or cloud metadata endpoints.
Because the server trusts these user-controlled URLs without sufficient checks, attackers can exploit this to access internal resources that are normally protected, potentially leading to information disclosure, port scanning, or even remote code execution.
How can this vulnerability impact me? :
This vulnerability can have several serious impacts including unauthorized access to internal network services and cloud metadata endpoints. Attackers can leverage it to gather sensitive information about the internal environment, perform port scanning to identify other vulnerable services, and potentially execute remote code on the server.
Such impacts can compromise the confidentiality and integrity of your systems and data, leading to data breaches or further exploitation within your network.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this SSRF vulnerability involves monitoring and identifying unauthorized or suspicious HTTP requests to internal services or cloud metadata endpoints originating from the vulnerable `/api/files/export-content` endpoint.
Since the vulnerability allows arbitrary HTTP requests to internal IPs and metadata IPs, you can look for unusual outbound requests to private IP ranges or the specific metadata IP 169.254.169.254.
Suggested commands to detect potential exploitation attempts include:
- Using network monitoring tools like tcpdump or tshark to capture outbound HTTP requests from the server:
- tcpdump -i <interface> 'tcp dst port 80 or tcp dst port 443' and src host <server_ip>
- Searching web server or application logs for requests to `/api/files/export-content` with suspicious payloads containing internal IP addresses or metadata URLs.
- Using curl or similar tools to test the endpoint with crafted URLs to see if internal resources can be accessed (only in a controlled environment):
- curl -X POST -d '{"url":"http://169.254.169.254/latest/meta-data/"}' https://<target>/api/files/export-content
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade parisneo/lollms to version 2.2.0 or later, where SSRF protection has been implemented.
This update includes a URL validation function that blocks requests to private, loopback, link-local, multicast, reserved IP addresses, and the cloud metadata IP 169.254.169.254.
If upgrading immediately is not possible, consider implementing network-level restrictions to block outbound HTTP requests from the application server to internal IP ranges and the metadata IP.
Additionally, monitor and audit logs for suspicious activity targeting the vulnerable endpoint.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The SSRF vulnerability in parisneo/lollms allows attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints, potentially leading to information disclosure and unauthorized internal network access.
Such unauthorized access and information disclosure could impact compliance with standards and regulations like GDPR and HIPAA, which require protection of sensitive data and prevention of unauthorized access to internal systems.
Therefore, exploitation of this vulnerability could lead to violations of data protection and privacy requirements mandated by these regulations.