LoLLMS Code Injection vulnerability
High severity
GitHub Reviewed
Published
Mar 20, 2025
to the GitHub Advisory Database
•
Updated Mar 21, 2025
Description
Published by the National Vulnerability Database
Mar 20, 2025
Published to the GitHub Advisory Database
Mar 20, 2025
Reviewed
Mar 21, 2025
Last updated
Mar 21, 2025
A remote code execution vulnerability exists in the Calculate function of parisneo/lollms version 9.8. The vulnerability arises from the use of Python's
eval()function to evaluate mathematical expressions within a Python sandbox that disables__builtins__and only allows functions from themathmodule. This sandbox can be bypassed by loading theosmodule using the_frozen_importlib.BuiltinImporterclass, allowing an attacker to execute arbitrary commands on the server. The issue is fixed in version 9.10.References