CVE-2026-0562 - Vulnerability Analysis
HighCVSS: 8.3Last Updated: March 29, 2026
parisneo lollms - Broken Access Control
Overview
parisneo/lollms <= 2.2.0 contains an insecure direct object reference caused by missing authorization checks in respond_request() in backend/routers/friends.py, letting authenticated users accept or reject others' friend requests, exploit requires user authentication.
Severity & Score
Impact
Authenticated users can manipulate friend requests of others, leading to unauthorized access and privacy violations.
Mitigation
Update to version 2.2.0 or later.
References
Social Media Activity(2 posts)
š CVE-2026-0562 - High (8.3) A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not impleme... š https://www.thehackerwire.com/vulnerability/CVE-2026-0562/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-0562 - High (8.3) A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not impleme... š https://www.thehackerwire.com/vulnerability/CVE-2026-0562/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-0562
- Severity
- High
- CVSS Score
- 8.3
- Type
- broken_access_control
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-863
CVSS Metrics
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L