CVE-2026-1114
paris-neo · lollms
lollms uses a weak secret key for JWT signing, enabling attackers to forge administrative tokens via offline brute-force.
Executive summary
A weak session management implementation in lollms allows attackers to forge administrative tokens, leading to full application compromise.
Vulnerability
The application uses a weak secret key for signing JWTs. This allows attackers to perform offline brute-force attacks to recover the key and subsequently forge tokens to gain administrative access.
Business impact
Successful exploitation allows an attacker to escalate privileges to administrative levels, gaining full control over the application. With a 9.8 CVSS score, this is a critical threat to the security and privacy of the application.
Remediation
Immediate Action: Update to lollms version 2.2.0 or later.
Proactive Monitoring: Monitor for suspicious login patterns, particularly administrative accounts accessing the system from unusual locations.
Compensating Controls: Ensure that the secret key used for session management is complex, unique, and not stored in source code.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
This is a critical authentication flaw. Organizations must update to version 2.2.0 immediately to ensure session integrity and prevent unauthorized administrative access.