A path traversal vulnerability exists in the api open_personality_folder endpoint of parisneo/lollms-webui. This vulnerability allows an attacker to read any folder in the personality_folder on the victim's computer, even though sanitize_path is set. The issue arises due to improper sanitization of the personality_folder parameter, which can be exploited to traverse directories and access arbitrary files.
https://huntr.com/bounties/79c11579-47d8-4e68-8466-b47c3bf5ef6a
https://github.com/parisneo/lollms/commit/28ee567a9a120967215ff19b96ab7515ce469620