An SQL injection vulnerability exists in the `delete_discussion()` function of the parisneo/lollms-webui application, allowing an attacker to delete all discussions and message data. The vulnerability is exploitable via a crafted HTTP POST request to the `/delete_discussion` endpoint, which internally calls the vulnerable `delete_discussion()` function. By sending a specially crafted payload in the 'id' parameter, an attacker can manipulate SQL queries to delete all records from the 'discussion' and 'message' tables. This issue is due to improper neutralization of special elements used in an SQL command.
History

Mon, 07 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms-webui
CPEs cpe:2.3:a:lollms:lollms-webui:9.0:*:*:*:*:*:*:*
cpe:2.3:a:lollms:lollms-webui:9.1:*:*:*:*:*:*:*
Vendors & Products Lollms
Lollms lollms-webui
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-04-16T00:00:14.318Z

Updated: 2024-08-01T18:48:21.597Z

Reserved: 2024-02-17T02:25:45.921Z

Link: CVE-2024-1601

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:21.597Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-16T00:15:09.597

Modified: 2025-07-07T15:54:16.207

Link: CVE-2024-1601

cve-icon Redhat

No data.