A path traversal vulnerability exists in the ParisNeo/lollms repository, specifically in the lollms_file_system.py file. The functions add_rag_database, toggle_mount_rag_database, and vectorize_folder do not implement security measures such as sanitize_path_from_endpoint or sanitize_path. This allows an attacker to perform vectorize operations on .sqlite files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.
{
"cwe_ids": [
"CWE-22"
],
"github_reviewed": true,
"nvd_published_at": "2024-10-11T13:15:16Z",
"github_reviewed_at": "2024-10-11T17:47:38Z",
"severity": "LOW"
}