JustAppSec
Back to news

Message deserialization XSS in lollms enables session hijack

2 min readPublished 12 Apr 2026Updated 12 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — A High-severity XSS in parisneo/lollms can let attacker-supplied message content execute as JavaScript in another user’s browser, risking session hijacking and account takeover.

What happened

lollms is a multi-user web application (FastAPI backend + Vue frontend) that provides a chat interface to LLM backends and related features like RAG, user management, and sharing.

CVE-2026-1116 describes a Cross-Site Scripting vulnerability in the from_dict method of the AppLollmsMessage class. The CVE record states the issue is caused by missing sanitization / HTML encoding of the content field when deserializing user-provided data, allowing an attacker to inject HTML/JavaScript that can execute in the context of another user’s browser.

ItemSource value
Affected softwareparisneo/lollms
Vulnerability classCross-Site Scripting (XSS)
Root cause (CVE)Missing sanitization / HTML encoding of message content during deserialization (from_dict)
SeverityCVSS v3.0 8.2 (High) (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N)
Affected versions (CVE record)Versions less than 2.2.0 (lessThan: 2.2.0, status: affected)
Patch reference (CVE record)Upstream commit 9767b882dbc893c388a286856beeaead69b8292a

XSS remains especially high-leverage in multi-user AI/web tooling because it targets identity-bearing browser sessions (tokens, admin panels, sharing features). The CVE record also calls out the potential for “wormable attacks,” which can rapidly amplify impact in collaborative apps.

Who is impacted

  • Deployments running parisneo/lollms where the deployed version falls into the CVE record’s affected range (versions less than 2.2.0).
  • Multi-user or shared instances where one user’s content can be rendered in other users’ sessions (e.g., shared chats, admin review workflows, moderation, or collaboration features).
  • Higher-risk environments where lollms is exposed to untrusted users or content sources (public sign-ups, partner access, or internet-reachable deployments).

What to do now

  • Follow vendor remediation guidance and apply a release that is not in the CVE record’s affected range (the CVE lists versions less than 2.2.0 as affected).
  • Inventory where lollms is deployed (VMs, containers, and packaged artifacts) and confirm the exact running version.
  • Use the CVE record’s patch reference to validate that your deployed build includes the fix (commit 9767b882dbc893c388a286856beeaead69b8292a) if you maintain forks or custom builds.
  • If compromise is suspected, treat this as potential session exposure: rotate credentials/tokens accessible to impacted user sessions and review for unexpected administrative actions or new/modified content that could be carrying payloads.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.