CVE-2026-1114
Received Received - Intake
Weak JWT Secret in parisneo/lollms 2.1.0 Enables Privilege Escalation

Publication date: 2026-04-07

Last updated on: 2026-04-28

Assigner: huntr.dev

Description
In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brute-force attack to recover the secret key. Once the secret key is obtained, the attacker can forge administrative tokens by modifying the JWT payload and resigning it with the cracked secret. This enables unauthorized users to escalate privileges, impersonate the administrator, and gain access to restricted endpoints. The issue is resolved in version 2.2.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
lollms lollms 2.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

In parisneo/lollms version 2.1.0, the application's session management is vulnerable due to the use of a weak secret key for signing JSON Web Tokens (JWT). This weakness allows an attacker to perform an offline brute-force attack to recover the secret key. Once the attacker obtains the secret key, they can forge administrative tokens by modifying the JWT payload and resigning it with the cracked secret. This enables unauthorized privilege escalation, impersonation of the administrator, and access to restricted endpoints.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized users gaining administrative privileges. Attackers can impersonate administrators and access restricted parts of the application, potentially leading to data breaches, unauthorized actions, and full compromise of the system's security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for weak or improperly secured JWT secret keys used by the parisneo/lollms application. Since the vulnerability allows offline brute-force attacks on the JWT secret key, one way to detect it is by checking the strength and configuration of the secret key in the application's environment.

Additionally, improved logging introduced in the backend/config.py file (as per the commit in Resource 1) enhances visibility of security-related events, which can help in detecting attempts to exploit the vulnerability.

Specific commands to check for weak JWT secret keys or suspicious JWT tokens are not provided in the resources. However, general approaches include:

  • Inspect the `.env` file or configuration files for the `SECRET_KEY` value to ensure it is strong and not default or weak.
  • Use JWT decoding tools (e.g., `jwt.io` debugger or command-line tools like `jwt-cli`) to analyze tokens for suspicious payload modifications.
  • Monitor application logs for messages related to secret key updates or errors, which are now enhanced with colored output for better visibility as per the commit.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade the parisneo/lollms application to version 2.2.0 or later, where this vulnerability has been resolved.

If upgrading immediately is not possible, ensure that the JWT secret key used for signing tokens is strong, randomly generated, and securely stored to prevent brute-force attacks.

According to the commit in Resource 1, the application now includes improved logging for secret key updates and errors, so monitoring these logs can help ensure that the secret key is properly set and maintained.

  • Update the `.env` file with a new secure `SECRET_KEY`.
  • Monitor logs for any errors writing the secret key and avoid fallback to temporary keys.
  • Restrict access to the application and its configuration files to trusted administrators only.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in parisneo/lollms version 2.1.0 allows attackers to recover the secret key used for signing JSON Web Tokens (JWT) through an offline brute-force attack. This enables unauthorized privilege escalation and access to restricted endpoints by forging administrative tokens.

Such unauthorized access and privilege escalation can lead to exposure or manipulation of sensitive data, which may violate common standards and regulations like GDPR and HIPAA that require strict access controls and protection of personal or health information.

Therefore, this vulnerability negatively impacts compliance by undermining the integrity and confidentiality controls mandated by these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart