Known Vulnerabilities for Lollms Web Ui by Lollms

Listed below are 1 of the newest known vulnerabilities associated with "Lollms Web Ui" by "Lollms".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-33340 json LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Multi modal Systems. A critical Server-Side Reque... Not Provided 2026-03-24 2026-03-24
CVE-2026-1163 json An insufficient session expiration vulnerability exists in the latest version of parisneo/lollms. The application fails to in... Not Provided 2026-04-08 2026-04-08
CVE-2026-1116 json A Cross-site Scripting (XSS) vulnerability was identified in the `from_dict` method of the `AppLollmsMessage` class in parisn... Not Provided 2026-04-12 2026-04-13
CVE-2026-1115 json A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the late... Not Provided 2026-04-10 2026-04-10
CVE-2026-1114 json In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the us... Not Provided 2026-04-07 2026-04-07
CVE-2026-0562 json A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject f... Not Provided 2026-03-29 2026-03-30
CVE-2026-0560 json A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/a... Not Provided 2026-03-29 2026-03-30
CVE-2026-0558 json A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process fil... Not Provided 2026-03-29 2026-03-30
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report