CVE-2026-1116
Parisneo · Lollms
A Cross-site Scripting (XSS) vulnerability exists in the `from_dict` method of the `AppLollmsMessage` class in the Parisneo Lollms library.
Executive summary
A Cross-site Scripting (XSS) vulnerability in Parisneo Lollms allows attackers to execute malicious scripts within a user's browser session.
Vulnerability
This is a Cross-site Scripting (XSS) vulnerability located in the from_dict method of the AppLollmsMessage class. The flaw allows for the injection of arbitrary scripts, which will execute in the context of an authenticated user's browser session.
Business impact
With a CVSS score of 8.2, this vulnerability poses a significant risk to user data confidentiality. Successful exploitation allows for session hijacking, credential theft, and unauthorized actions performed on behalf of legitimate users, potentially leading to widespread account compromise.
Remediation
Immediate Action: Update the Lollms library to version 2 or later to ensure the from_dict method is properly sanitized.
Proactive Monitoring: Monitor web application traffic for suspicious script tags or encoded payloads consistent with XSS attack patterns.
Compensating Controls: Implement a robust Content Security Policy (CSP) to restrict the execution of unauthorized scripts and utilize a Web Application Firewall (WAF) to filter malicious input.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The presence of an XSS vulnerability in a library used for message handling necessitates an immediate update. Security teams should verify that all downstream applications utilizing the Lollms library are updated to version 2 to prevent potential session-based attacks.