{"id":"CVE-2024-6982","details":"A remote code execution vulnerability exists in the Calculate function of parisneo/lollms version 9.8. The vulnerability arises from the use of Python's `eval()` function to evaluate mathematical expressions within a Python sandbox that disables `__builtins__` and only allows functions from the `math` module. This sandbox can be bypassed by loading the `os` module using the `_frozen_importlib.BuiltinImporter` class, allowing an attacker to execute arbitrary commands on the server. The issue is fixed in version 9.10.","aliases":["GHSA-jccx-m9v4-9hwh"],"modified":"2026-05-04T08:48:42.721277Z","published":"2025-03-20T10:15:34.740Z","withdrawn":"2026-05-04T08:48:42.721277Z","references":[{"type":"WEB","url":"https://huntr.com/bounties/4f8e73ac-aaaf-4d5c-a6dd-58215b5a7fea"},{"type":"FIX","url":"https://github.com/parisneo/lollms/commit/30e7eaba2ccfb751a81e7cb29fdef2ae8ffa6832"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6982.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}