{"id":"CVE-2024-6581","details":"A vulnerability in the discussion image upload function of the Lollms application, version v9.9, allows for the uploading of SVG files. Due to incomplete filtering in the sanitize_svg function, this can lead to cross-site scripting (XSS) vulnerabilities, which in turn pose a risk of remote code execution. The sanitize_svg function only removes script elements and 'on*' event attributes, but does not account for other potential vectors for XSS within SVG files. This vulnerability can be exploited when authorized users access a malicious URL containing the crafted SVG file.","aliases":["GHSA-cm59-8rmv-f2cj","PYSEC-2024-116"],"modified":"2026-04-10T05:19:23.568328Z","published":"2024-10-29T13:15:07.840Z","references":[{"type":"FIX","url":"https://github.com/parisneo/lollms/commit/328b960a0de2097e13654ac752253e9541521ddd"},{"type":"EVIDENCE","url":"https://huntr.com/bounties/ad68ecd6-44e2-449b-8e7e-f2b71b1b43c7"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6581.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.9"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"}]}