[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-1115":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-10T20:12:16.648Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":44,"aliases":45,"duplicate_of":9,"upstream":46,"downstream":47,"duplicates":48,"related":49,"reserved_at":9,"published_at":50,"modified_at":51,"state":52,"summary":53,"references_raw":62,"kevs":72,"epss":73,"epss_history":76,"metrics":78,"affected":86},"CVE-2026-1115","A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the latest version prior to 2.2.0. The vulnerability exists in the `create_post` function within `backend/routers/social/__init__.py`, where user-provided content is directly assigned to the `DBPost` model without sanitization. This allows attackers to inject and store malicious JavaScript, which is executed in the browsers of users viewing the Home Feed, including administrators. This can lead to account takeover, session hijacking, and wormable attacks. The issue is resolved in version 2.2.0.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-79","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.","weakness","Stable","Base","High",[20,24,28,32,36,40],{"id":21,"name":22,"techniques":23},"CAPEC-209","XSS Using MIME Type Mismatch",[],{"id":25,"name":26,"techniques":27},"CAPEC-588","DOM-Based XSS",[],{"id":29,"name":30,"techniques":31},"CAPEC-591","Reflected XSS",[],{"id":33,"name":34,"techniques":35},"CAPEC-592","Stored XSS",[],{"id":37,"name":38,"techniques":39},"CAPEC-63","Cross-Site Scripting (XSS)",[],{"id":41,"name":42,"techniques":43},"CAPEC-85","AJAX Footprinting",[],[],[],[],[],[],[],"2026-04-10T06:23:13.463Z","2026-04-10T13:01:44.634Z","Received",{"cisa_kev":54,"cisa_ransomware":54,"cisa_vendor":9,"epss_severity":55,"epss_score":56,"severity":57,"severity_score":58,"severity_version":59,"severity_source":60,"severity_vector":61,"severity_status":52},false,"low",0.00045,"critical",9.6,"v3.0","cve.org","CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",[63,68],{"url":64,"sources":65,"tags":67},"https://huntr.com/bounties/099aa4fe-7165-4337-889c-3fb4f1aa71aa",[60,66],"nvd",[],{"url":69,"sources":70,"tags":71},"https://github.com/parisneo/lollms/commit/9767b882dbc893c388a286856beeaead69b8292a",[60,66],[],[],{"date":74,"score":56,"percentile":75},"2026-04-10",0.13812,[77],{"date":74,"score":56,"percentile":75},[79,84],{"source":60,"cvss_v2_0":9,"cvss_v3_0":80,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":58,"baseSeverity":81,"vectorString":61,"impactScore":82,"exploitabilityScore":83},"CRITICAL",10,7.2,{"source":66,"cvss_v2_0":9,"cvss_v3_0":85,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":58,"baseSeverity":81,"vectorString":61,"impactScore":82,"exploitabilityScore":83},[87],{"ecosystem":9,"name":88,"vendor":89,"product":88,"cpe_part":90,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":91},"parisneo/lollms","parisneo","a",[92],{"version":93,"is_range":94,"range_type":60,"version_start":95,"version_start_type":96,"version_end":97,"version_end_type":98,"fixed_in":9},">= unspecified, \u003C 2.2.0",true,"unspecified","including","2.2.0","excluding"]