CVE-2026-1115
parisneo · lollms
A stored Cross-Site Scripting (XSS) vulnerability in the lollms social feature allows unauthenticated attackers to inject malicious JavaScript, leading to potential account takeover.
Executive summary
A critical stored XSS vulnerability in the lollms social feature allows attackers to execute arbitrary code in the browsers of administrators and users, leading to full session hijacking.
Vulnerability
The create_post function fails to sanitize user-provided content before storing it in the DBPost model. This allows an attacker to inject malicious JavaScript that executes whenever a user, including an administrator, views the Home Feed.
Business impact
The CVSS score of 9.6 reflects the severe risk of "wormable" attacks and administrative account takeover. Compromise of an administrator account grants the attacker full control over the lollms platform, enabling further malicious activity and potential lateral movement.
Remediation
Immediate Action: Upgrade lollms to version 2.2.0 or higher immediately to implement mandatory input sanitization.
Proactive Monitoring: Review platform activity logs for suspicious posts containing script tags or abnormal redirect patterns.
Compensating Controls: Use a Content Security Policy (CSP) to restrict the execution of unauthorized scripts within the browser, providing a layer of defense against XSS.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The risk of account takeover via this XSS vulnerability is severe. All instances of lollms must be updated to version 2.2.0 immediately to prevent exploitation and protect administrative sessions.