Lollms has an Improper Access Control vulnerability
High severity
GitHub Reviewed
Published
Feb 2, 2026
to the GitHub Advisory Database
•
Updated Feb 2, 2026
Description
Published by the National Vulnerability Database
Feb 2, 2026
Published to the GitHub Advisory Database
Feb 2, 2026
Reviewed
Feb 2, 2026
Last updated
Feb 2, 2026
A vulnerability in the
lollms_generation_events.pycomponent of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. Theadd_eventsfunction registers event handlers such asgenerate_text,cancel_generation,generate_msg, andgenerate_msg_fromwithout implementing authentication or authorization checks. This allows unauthenticated clients to execute resource-intensive or state-altering operations, leading to potential denial of service, state corruption, and race conditions. Additionally, the use of global flags (lollmsElfServer.busy,lollmsElfServer.cancel_gen) for state management in a multi-client environment introduces further vulnerabilities, enabling one client's actions to affect the server's state and other clients' operations. The lack of proper access control and reliance on insecure global state management significantly impacts the availability and integrity of the service.References