A command injection vulnerability exists in the mudler/localai version 2.14.0. The vulnerability arises from the application's handling of the backend parameter in the configuration file, which is used in the name of the initialized process. An attacker can exploit this vulnerability by manipulating the path of the vulnerable binary file specified in the backend parameter, allowing the execution of arbitrary code on the system. This issue is due to improper neutralization of special elements used in an OS command, leading to potential full control over the affected system.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.02278}

epss

{'score': 0.02145}


Tue, 15 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Mudler
Mudler localai
CPEs cpe:2.3:a:mudler:localai:2.14.0:*:*:*:*:*:*:*
Vendors & Products Mudler
Mudler localai

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-26T02:53:58.461Z

Updated: 2024-08-01T21:03:11.039Z

Reserved: 2024-05-21T18:08:42.864Z

Link: CVE-2024-5181

cve-icon Vulnrichment

Updated: 2024-08-01T21:03:11.039Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-26T03:15:10.987

Modified: 2025-07-15T15:38:01.030

Link: CVE-2024-5181

cve-icon Redhat

No data.