CVE-2026-1115
Stored XSS in parisneo/lollms Social Feature Enables Account Takeover
Publication date: 2026-04-10
Last updated on: 2026-04-16
Assigner: huntr.dev
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lollms | lollms | to 2.1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-1115 is a Stored Cross-Site Scripting (XSS) vulnerability found in the social feature of the parisneo/lollms platform prior to version 2.2.0. The issue occurs because user-provided content is directly stored in the database without proper sanitization in the create_post function. This allows attackers to inject malicious JavaScript code that executes in the browsers of users who view the affected content, including administrators.
The vulnerability was fixed by introducing a sanitization function using the Python bleach library, which cleans user inputs by allowing only a strict whitelist of safe HTML tags and attributes. This sanitization is applied to posts, comments, direct messages, and group conversation names to prevent malicious scripts from being stored and executed.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including account takeover, session hijacking, and wormable attacks. Because malicious scripts can execute in the browsers of users viewing the compromised content, attackers can steal sensitive information, impersonate users, or spread the attack to other users automatically.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying stored malicious JavaScript in user-generated content such as posts, comments, direct messages, or group conversation names within the LoLLMs platform.
One approach is to query the database for suspicious content containing script tags or event handlers that could indicate stored XSS payloads.
- Use database queries to search for common XSS patterns, for example, searching for '<script>' tags or 'onerror=', 'onclick=' attributes in post or message content.
- Example SQL command to find suspicious content in posts: SELECT id, content FROM posts WHERE content LIKE '%<script>%';
- Similarly, search comments and direct messages tables for suspicious patterns.
Additionally, monitoring HTTP traffic for unexpected JavaScript execution or unusual user behavior in the Home Feed could help detect exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to upgrade the LoLLMs platform to version 2.2.0 or later, where the vulnerability is fixed by applying input sanitization.
If immediate upgrade is not possible, apply input sanitization to all user-generated content that can contain HTML or rich text, such as posts, comments, direct messages, and group conversation names.
- Integrate a sanitization library like bleach to clean inputs before storing them in the database.
- Run a sanitization script on existing database content to remove any previously stored malicious scripts.
Limit user permissions and monitor for suspicious activity to reduce the risk of exploitation until the patch is applied.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to inject and execute malicious scripts in users' browsers, potentially leading to account takeover and session hijacking. Such security breaches can result in unauthorized access to personal data, which may violate data protection regulations like GDPR and HIPAA that require safeguarding user information against unauthorized access and ensuring data integrity.
By enabling stored Cross-Site Scripting (XSS) attacks, the vulnerability undermines the confidentiality and integrity of user data, which are core principles in many compliance frameworks. Organizations using affected versions prior to 2.2.0 may face compliance risks until the vulnerability is patched.
The fix, which involves sanitizing user inputs to prevent XSS, helps restore compliance by mitigating risks of data breaches and unauthorized data exposure.