{"id":"CVE-2024-5824","details":"A path traversal vulnerability in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the `configs/config.yaml` file. This can lead to remote code execution by changing server configuration properties such as `force_accept_remote_access` and `turn_on_code_validation`.","aliases":["GHSA-m45c-v46h-c788"],"modified":"2026-05-04T08:47:43.861074Z","published":"2024-06-27T19:15:17.117Z","withdrawn":"2026-05-04T08:47:43.861074Z","references":[{"type":"WEB","url":"https://huntr.com/bounties/9ceb7cf9-a7cd-4699-b3f8-d0999d2b49fd"},{"type":"FIX","url":"https://github.com/parisneo/lollms/commit/eda3af5f5c4ea9b2f3569f72f8d05989e29367fc"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-5824.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}