Ad

CVE-2026-1114

CRITICAL CVSS 3.0: 9.8
Updated Apr 07, 2026
Payload
Parameter Value
CVSS 9.8 (CRITICAL)
Fixed In 2.2.0
Type CWE-284 (Improper Access Control)
Vendor Payload
Public PoC No

In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brute-force attack to recover the secret key. Once the secret key is obtained, the attacker can forge administrative tokens by modifying the JWT payload and resigning it with the cracked secret.

This enables unauthorized users to escalate privileges, impersonate the administrator, and gain access to restricted endpoints. The issue is resolved in version 2.2.0.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.0

Vulnerable Products

parisneo:parisneo/lollms