TopVuln

High-risk vulnerability digests

CVE-2026-1114

  • CRITICAL

EUVD-2026-19574

Details

CVSS v3
9.8
NVD published
2026-04-07 07:16:23
EPSS
<0.1% probability · 5.6th percentile — 2026-05-12
Affected versions
parisneo/lollms version 2.1.0
Summary
This vulnerability exists in Lollms version 2.1.0 due to the use of a weak secret key for signing JSON Web Tokens for session management. Attackers can perform an offline brute-force attack to recover the secret key, then forge administrative JWT tokens to gain full administrative access. This allows unauthorized privilege escalation and full system compromise.
Remediation
Upgrade Lollms to version 2.2.0 or later, which resolves this issue. After upgrading, generate a new strong, cryptographically secure secret key for JWT signing to prevent similar attacks.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.