CVE-2024-1601

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-1601
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-1601.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-1601
Published
2024-04-16T00:15:09Z
Modified
2025-10-16T19:06:13.373716Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An SQL injection vulnerability exists in the delete_discussion() function of the parisneo/lollms-webui application, allowing an attacker to delete all discussions and message data. The vulnerability is exploitable via a crafted HTTP POST request to the /delete_discussion endpoint, which internally calls the vulnerable delete_discussion() function. By sending a specially crafted payload in the 'id' parameter, an attacker can manipulate SQL queries to delete all records from the 'discussion' and 'message' tables. This issue is due to improper neutralization of special elements used in an SQL command.

References

Affected packages

Git / github.com/parisneo/lollms-webui

Affected ranges

Type
GIT
Repo
https://github.com/parisneo/lollms-webui
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.1
v0.0.2
v0.0.3
v0.0.4
v0.0.5
v0.0.6
v0.0.7
v0.0.8
v0.0.9

v3.*

v3.0
v3.5

v4.*

v4.0

v5.*

v5.0

v6.*

v6.0
v6.5
v6.5.0
v6.5rc2
v6.7

v7.*

v7.0

v8.*

v8.0
v8.5

v9.*

v9.0
v9.1