Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

592+ Articles
117+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-1114: lollms JWT Weak Secret Key Allows Admin Takeover
CVE-2026-1114: lollms JWT Weak Secret Key Allows Admin Takeover

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-1114

CVE-2026-1114: lollms JWT Weak Secret Key Allows Admin Takeover

A critical vulnerability (CVSS 9.8) in parisneo/lollms v2.1.0 allows attackers to brute-force the application's JWT secret key offline, forge authentication tokens, and escalate privileges to administrator without valid credentials.

Dylan H.

Security Team

April 7, 2026
6 min read

Affected Products

  • parisneo/lollms <= 2.1.0

Executive Summary

A critical authentication vulnerability tracked as CVE-2026-1114 has been disclosed in parisneo/lollms version 2.1.0, a widely used open-source large language model server and AI assistant platform. The vulnerability stems from the application's use of a weak, predictable secret key for signing JSON Web Tokens (JWTs), enabling an attacker to recover the key offline via brute-force and subsequently forge valid authentication tokens with arbitrary privilege levels — including full administrator access.

CVSS Score: 9.8 (Critical)


Vulnerability Overview

Root Cause

lollms uses JWTs to manage user sessions and authorization. The application was found to sign these tokens with a secret key that is insufficiently random and short enough to be recovered through offline dictionary or brute-force attacks. Once an attacker obtains any valid signed JWT (e.g., from an authenticated session or public endpoint), they can:

  1. Extract the signed token
  2. Run an offline brute-force or dictionary attack against the weak secret
  3. Recover the secret key
  4. Forge new JWTs with elevated privileges (e.g., "role": "admin")
  5. Authenticate as administrator with no valid credentials
AttributeValue
CVE IDCVE-2026-1114
CVSS Score9.8 (Critical)
TypeImproper Access Control / Weak Cryptographic Key
Attack VectorNetwork
AuthenticationRequired (any low-privileged account)
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh

Affected Versions

ProductAffected VersionStatus
parisneo/lollms2.1.0Vulnerable

Check the lollms GitHub releases for patched versions. Users running self-hosted lollms instances should treat all existing sessions as potentially compromised and rotate the JWT secret key immediately.


Attack Chain

1. Attacker registers a low-privileged account (or obtains any valid JWT from an exposed endpoint)
2. Extracts the signed JWT from an HTTP response or cookie
3. Runs offline brute-force / dictionary attack against the JWT signature
   - Tools: hashcat, jwt-cracker, or custom scripts targeting HS256
4. Recovers the weak secret key
5. Crafts a forged JWT with admin role/claims
6. Authenticates to lollms as administrator
7. Full application control: model management, data access, system commands

Why JWT Brute-Force Is Feasible

When a JWT is signed with HMAC-SHA256 (HS256) and the secret key is weak (short, dictionary-based, or sequential), modern GPU-accelerated tools like hashcat can test billions of key candidates per second against a captured token. This attack is:

  • Offline — no rate limiting or account lockout applies
  • Fast — common weak keys are cracked in seconds to minutes
  • Silent — leaves no trace in application logs
  • Deterministic — if the key is weak, it will be found

Impact Assessment

Successful exploitation grants an attacker full administrative control over the lollms instance, enabling:

Impact CategoryConsequence
Data exfiltrationAccess to all stored conversations, documents, and uploaded files
Model manipulationModify, delete, or replace AI models and configurations
System command executionDepending on deployment, admin interfaces may expose OS-level functionality
Lateral movementCompromised lollms server can serve as pivot point in internal networks
Credential theftAccess to stored API keys for connected LLM providers (OpenAI, Anthropic, etc.)
Persistent backdoorCreate additional admin accounts or modify application code

lollms is often deployed internally or on home lab servers, but many instances are also internet-exposed — particularly in research environments. An exposed, vulnerable instance is a direct path to full compromise.


Remediation

Immediate Actions

  1. Update lollms to the latest version that addresses CVE-2026-1114
  2. Rotate the JWT secret key — any previously issued tokens must be invalidated
  3. Review access logs for unusual authentication patterns or privilege escalation indicators
  4. Revoke all active sessions to force re-authentication with a new, strong secret

Configuration Hardening

If an update is not immediately possible:

  1. Restrict network access — place lollms behind a VPN or firewall; do not expose to the public internet
  2. Generate a cryptographically strong JWT secret — minimum 256-bit random value; never use dictionary words or short strings
  3. Implement IP allowlisting if lollms must be accessible remotely

JWT Secret Key Best Practices

# DO NOT use weak keys like:
SECRET_KEY = "secret"
SECRET_KEY = "lollms123"
SECRET_KEY = "changeme"
 
# Use a cryptographically secure random key:
import secrets
SECRET_KEY = secrets.token_hex(32)  # 256-bit random key

Detection

Signs of Exploitation

IndicatorDescription
Admin actions from unexpected usersReview audit logs for privilege escalation events
JWT tokens with unusual claimsMonitor for admin role tokens issued to low-privileged accounts
New admin account creationUnauthorized accounts with elevated privileges
Unexpected API key access or rotationLLM provider API keys accessed or changed
Unusual file accessDocuments or model files accessed outside normal patterns

Threat Hunting Query (Conceptual)

Look for JWT tokens in application logs where the role claim is admin but the token was issued for a user account that should not have admin access. Cross-reference with authentication logs to identify tokens that were not produced by legitimate login flows.


Key Takeaways

  1. CVSS 9.8 Critical — An attacker with any valid JWT can escalate to admin
  2. Offline attack — No interaction with the server required after obtaining a single token
  3. Update immediately — Patch lollms and rotate the JWT secret key
  4. Do not expose lollms to the internet without proper authentication controls and network restrictions
  5. AI/LLM servers are high-value targets — they often store API keys for commercial AI providers and sensitive data

References

  • NVD — CVE-2026-1114
  • parisneo/lollms GitHub
  • OWASP — JSON Web Token Attack Cheat Sheet
#CVE-2026-1114#lollms#JWT#Authentication Bypass#Privilege Escalation#AI Security

Related Articles

CVE-2026-31946: Critical JWT Signature Verification Bypass in OpenOlat E-Learning Platform

OpenOlat versions 10.5.4 through 20.2.4 fail to verify JWT signatures in their OpenID Connect implicit flow, allowing unauthenticated attackers to...

6 min read

CVE-2026-5555: SQL Injection in Concert Ticket Reservation System Login

An unauthenticated SQL injection vulnerability has been disclosed in code-projects Concert Ticket Reservation System 1.0, affecting the login.php file via the Email parameter — enabling authentication bypass and full database access. CVSS 7.3.

5 min read

CVE-2017-20237: Hirschmann HiVision Auth Bypass Enables Unauthenticated RCE

A critical authentication bypass in Hirschmann Industrial HiVision versions prior to 06.0.07 and 07.0.03 allows unauthenticated remote attackers to...

5 min read
Back to all Security Alerts