{"id":"CVE-2024-6985","details":"A path traversal vulnerability exists in the api open_personality_folder endpoint of parisneo/lollms-webui. This vulnerability allows an attacker to read any folder in the personality_folder on the victim's computer, even though sanitize_path is set. The issue arises due to improper sanitization of the personality_folder parameter, which can be exploited to traverse directories and access arbitrary files.","aliases":["GHSA-6h64-g7cj-hj56","PYSEC-2024-122"],"modified":"2026-04-10T05:19:30.548240Z","published":"2024-10-11T16:15:14.657Z","references":[{"type":"FIX","url":"https://github.com/parisneo/lollms/commit/28ee567a9a120967215ff19b96ab7515ce469620"},{"type":"EVIDENCE","url":"https://huntr.com/bounties/79c11579-47d8-4e68-8466-b47c3bf5ef6a"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6985.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}]}