JustAppSec
Back to news

lollms fixes weak JWT signing key enabling admin token forgery

2 min readPublished 07 Apr 2026Updated 07 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — A weak JWT signing secret in parisneo/lollms enables offline key cracking and forged administrative JWTs, turning any exposed session-authenticated endpoint into a potential admin-impersonation path.

What happened

parisneo/lollms (LoLLMS) is a self-hosted platform for running and managing LLM-driven applications and endpoints. CVE-2026-1114 describes a Critical session-management failure where the application uses a weak secret key for signing JSON Web Tokens (JWTs).

Per the CVE record, an attacker can brute-force the JWT signing secret offline and then forge administrative tokens by modifying the JWT payload and re-signing with the recovered secret, enabling privilege escalation and access to restricted endpoints.

ItemSource value
Affected productparisneo/lollms
Affected versions< 2.2.0
SeverityCVSS v3.0 9.8 (Critical)
CVSS vectorCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Fix status"resolved in version 2.2.0"

This is a high-impact, high-prevalence failure mode for platform teams because JWTs often gate every privileged API path; once the signing secret is recoverable, authorization becomes a client-controlled artifact, not a server-enforced control.

Who is impacted

  • Deployments running parisneo/lollms versions reported as affected in the CVE record (< 2.2.0).
  • Instances that expose lollms to untrusted networks (as implied by AV:N) or where untrusted users can obtain any form of access that yields JWTs for offline analysis.
  • Environments where the JWT signing secret is reused across deployments (e.g., cloned images or shared .env patterns), increasing cross-environment blast radius if one instance is cracked.

What to do now

  • Follow vendor remediation guidance and apply the latest patched release available at the time of writing.

    "The issue is resolved in version 2.2.0."

  • Inventory where parisneo/lollms is deployed (containers, VM images, and GitOps pins) and prioritize any internet-exposed instances.
  • Treat this as a potential auth-material compromise scenario:
    • rotate/replace the JWT signing secret(s) used by the service
    • invalidate existing sessions/tokens where operationally feasible
    • review logs for unexpected use of admin-only endpoints and suspicious token lifetimes/claims
  • If you run lollms behind a gateway, ensure the service is not reachable directly (reduce bypass paths) while rollout and key rotation are in progress.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.