CVE-2026-1115

| EUVD-2026-21320 CRITICAL
2026-04-10 @huntr_ai GHSA-8wrq-fv5f-pfp2
9.6
CVSS 3.0
Share

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Apr 11, 2026 - 02:30 nvd
Patch available
Analysis Generated
Apr 10, 2026 - 07:00 vuln.today
EUVD ID Assigned
Apr 10, 2026 - 07:00 euvd
EUVD-2026-21320
CVE Published
Apr 10, 2026 - 06:23 nvd
CRITICAL 9.6

Tags

Description

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the latest version prior to 2.2.0. The vulnerability exists in the `create_post` function within `backend/routers/social/__init__.py`, where user-provided content is directly assigned to the `DBPost` model without sanitization. This allows attackers to inject and store malicious JavaScript, which is executed in the browsers of users viewing the Home Feed, including administrators. This can lead to account takeover, session hijacking, and wormable attacks. The issue is resolved in version 2.2.0.

Analysis

Stored cross-site scripting in parisneo/lollms versions prior to 2.2.0 enables unauthenticated attackers to inject malicious JavaScript through unsanitized social post content in the create_post function. Injected scripts execute in victims' browsers when viewing the Home Feed, enabling account takeover, session hijacking, and wormable propagation across the platform. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all parisneo/lollms deployments and verify current versions-if running versions prior to 2.2.0, immediately isolate affected instances or disable the create_post/social feed functionality. Within 7 days: Upgrade to parisneo/lollms version 2.2.0 or later once released and validated in a test environment; if unavailable, escalate to vendor for patch timeline and consider temporary WAF rules to block POST requests to create_post endpoints. …

Sign in for detailed remediation steps.

Priority Score

48
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +48
POC: 0

Share

CVE-2026-1115 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy