CVE-2026-1114

paris-neo · lollms

lollms uses a weak secret key for JWT signing, enabling attackers to forge administrative tokens via offline brute-force.

Executive summary

A weak session management implementation in lollms allows attackers to forge administrative tokens, leading to full application compromise.

Vulnerability

The application uses a weak secret key for signing JWTs. This allows attackers to perform offline brute-force attacks to recover the key and subsequently forge tokens to gain administrative access.

Business impact

Successful exploitation allows an attacker to escalate privileges to administrative levels, gaining full control over the application. With a 9.8 CVSS score, this is a critical threat to the security and privacy of the application.

Remediation

Immediate Action: Update to lollms version 2.2.0 or later.

Proactive Monitoring: Monitor for suspicious login patterns, particularly administrative accounts accessing the system from unusual locations.

Compensating Controls: Ensure that the secret key used for session management is complex, unique, and not stored in source code.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

This is a critical authentication flaw. Organizations must update to version 2.2.0 immediately to ensure session integrity and prevent unauthorized administrative access.