Cyber Posture

CVE-2026-0558

CriticalPublic PoC

Published: 29 March 2026

Published
29 March 2026
Modified
31 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0033 56.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_active_user)` dependency. This issue can…

more

lead to denial of service (DoS) through resource exhaustion, information disclosure, and violation of the application's documented security policies.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification and restriction of actions performable without authentication, preventing unauthenticated access to the /api/files/extract-text endpoint.

prevent

Mandates enforcement of approved authorizations for access to system resources, ensuring the endpoint requires authentication like other file-related endpoints.

prevent

Enforces least privilege by authorizing access to file upload and processing only to explicitly approved users, mitigating unauthorized exploitation.

Security SummaryAI

CVE-2026-0558 is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) in the parisneo/lollms software, affecting versions up to and including 2.2.0. The issue stems from the `/api/files/extract-text` endpoint, which permits unauthenticated users to upload and process files without enforcing authentication, unlike other file-related endpoints. It specifically lacks the `Depends(get_current_active_user)` dependency, enabling improper authentication (CWE-287).

Any unauthenticated attacker with network access can exploit this endpoint to upload and process arbitrary files. Successful exploitation can result in denial of service through resource exhaustion, information disclosure by extracting text from sensitive files, and violation of the application's documented security policies, potentially compromising confidentiality, integrity, and availability.

Mitigation details are provided in the project's GitHub commit at https://github.com/parisneo/lollms/commit/a6625dc83786ff21d109b0d545ca61b770607ef3 and the Huntr bounty report at https://huntr.com/bounties/0a722001-89ce-4c91-b6a6-a55ee5ba2113. Security practitioners should review these resources for patch implementation and upgrade to a fixed version beyond 2.2.0.

Details

CWE(s)

Affected Products

lollms
lollms
≤ 2.1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Unauthenticated file upload and processing via public-facing API endpoint directly enables public-facing application exploitation (T1190), ingress tool transfer (T1105), and application-level DoS via resource exhaustion (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References