This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: SSRF via `/api/proxy`. π **Consequences**: Attackers force the server to make arbitrary GET requests. This leads to internal service access, local network scanning, and sensitive cloud metadata leakage.β¦
π’ **Vendor**: ParisNeo. π¦ **Product**: LoLLMs WEBUI (lollms-webui). π€ **Developer**: Saifeddine ALOUI. β οΈ **Affected**: Any instance running the vulnerable version of this multi-model LLM web interface.β¦
π **Threshold**: LOW. π **Auth**: None required. π±οΈ **UI**: Not required. π **Ease**: Any anonymous user on the network can exploit this. It is a 'Zero-Click' style auth bypass for the proxy function.β¦
π **Check**: Scan for `/api/proxy` endpoint. π‘ **Tool**: Use Nuclei with the CVE-2026-33340 template. π§ͺ **Test**: Send a GET request to the proxy pointing to `http://169.254.169.254` (cloud metadata).β¦