endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint

CVSS 7.7 open-webui View details
CVE UNKNOWN CVE-2024-12775

langgenius/dify version 0.10.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the test functionality for the Create Custom Tool option via the REST API `POST /console/api/workspaces/current/tool-provider/api/test/pre`. Attackers

version 3.83 of binary-husky/gpt_academic, a Server-Side Request Forgery (SSRF) vulnerability exists in the Markdown_Translate.get_files_from_everything() API. This vulnerability is exploited through the HotReload(Markdown翻译中) plugin

CVSS 7.5 gpt_academic View details

Academic version 3.83 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability through its HotReload plugin function, which calls the crazy_utils.get_files_from_everything() API without proper sanitization. This

CVSS 7.5 gpt_academic View details

Label Studio allows Server-Side Request Forgery in the S3

CVSS 8.6 label-studio View details
CVE MEDIUM CVE-2024-48052

gradio <=4.42.0, the gr.DownloadButton function has a hidden server-side request forgery (SSRF) vulnerability. The reason is that within the save_url_to_cache function, there are no restrictions

CVSS 6.5 gradio View details

Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application

CVSS 7.5 litellm View details
CVE MEDIUM CVE-2024-4940

exploited for phishing attacks, Cross-site Scripting (XSS), Server-Side Request Forgery (SSRF), amongst others. This issue is due to improper validation of user-supplied input in the handling

CVSS 6.1 gradio View details

Server-Side Request Forgery (SSRF) vulnerability exists in the Web Research Retriever component of langchain-ai/langchain version 0.1.5. The vulnerability arises because the Web Research Retriever does not restrict

CVSS 7.7 langchain View details

Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when

CVSS 8.6 gradio View details
CVE UNKNOWN CVE-2024-1183

SSRF (Server-Side Request Forgery) vulnerability exists in the gradio-app/gradio repository, allowing attackers to scan and identify open ports within an internal network. By manipulating the 'file' parameter

CVE MEDIUM CVE-2024-2206

SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls

CVSS 6.5 gradio View details

attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF and potentially injecting content into downstream tasks

CVSS 7.5 langchain View details

LangChain before 0.0.317 allows SSRF via document_loaders/recursive_url_loader.py because crawling can proceed from an external server to an internal server

CVSS 8.8 langchain View details

Fickling has a detection bypass via stdlib network-protocol constructors

TaskWeaver has Protection Mechanism Failure and Server-Side Request Forgery (SSRF

CVSS 6.5 agentos-taskweaver View details

picklescan has Arbitrary file read using `io.FileIO`

picklescan View details
CVE MEDIUM CVE-2025-68477

Langflow is a tool for building and deploying AI-powered

CVSS 6.5 langflow View details
Paper 2512.14860v1

Penetration Testing of Agentic AI: A Comparative Security Analysis Across Models and Frameworks

system and 13 distinct attack scenarios that span prompt injection, Server Side Request Forgery (SSRF), SQL injection, and tool misuse. Our 130 total test cases reveal significant security disparities: AutoGen

medium relevance tool
Previous Page 2 of 2