A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_active_user)` dependency. This issue can lead to denial of service (DoS) through resource exhaustion, information disclosure, and violation of the application's documented security policies.
Metrics
Affected Vendors & Products
References
History
Sun, 29 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_active_user)` dependency. This issue can lead to denial of service (DoS) through resource exhaustion, information disclosure, and violation of the application's documented security policies. | |
| Title | Unauthenticated File Upload in parisneo/lollms | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2026-03-29T17:53:08.003Z
Updated: 2026-03-29T17:53:08.003Z
Reserved: 2026-01-01T21:43:51.283Z
Link: CVE-2026-0558
No data.
Status : Received
Published: 2026-03-29T18:16:13.250
Modified: 2026-03-29T18:16:13.250
Link: CVE-2026-0558
No data.