A command injection vulnerability exists in the 'run_xtts_api_server' function of the parisneo/lollms-webui application, specifically within the 'lollms_xtts.py' script. The vulnerability arises due to the improper neutralization of special elements used in an OS command. The affected function utilizes 'subprocess.Popen' to execute a command constructed with a Python f-string, without adequately sanitizing the 'xtts_base_url' input. This flaw allows attackers to execute arbitrary commands remotely by manipulating the 'xtts_base_url' parameter. The vulnerability affects versions up to and including the latest version before 9.5. Successful exploitation could lead to arbitrary remote code execution (RCE) on the system where the application is deployed.
History

Wed, 09 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms Web Ui
CPEs cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*
Vendors & Products Lollms
Lollms lollms Web Ui

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-05-16T09:03:47.640Z

Updated: 2024-08-01T19:32:42.607Z

Reserved: 2024-04-01T08:27:17.093Z

Link: CVE-2024-3126

cve-icon Vulnrichment

Updated: 2024-08-01T19:32:42.607Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-16T09:15:13.840

Modified: 2025-07-09T14:36:46.093

Link: CVE-2024-3126

cve-icon Redhat

No data.