### [CVE-2024-6986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6986) ![](https://img.shields.io/static/v1?label=Product&message=parisneo%2Flollms-webui&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) ### Description A Cross-site Scripting (XSS) vulnerability exists in the Settings page of parisneo/lollms-webui version 9.8. The vulnerability is due to the improper use of the 'v-html' directive, which inserts the content of the 'full_template' variable directly as HTML. This allows an attacker to execute malicious JavaScript code by injecting a payload into the 'System Template' input field under main configurations. ### POC #### Reference No PoCs from references. #### Github - https://github.com/MorphyKutay/MorphyKutay