Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure

CVSS 7.1 flowise-components View details

Flowise Execute Flow function has an SSRF vulnerability

flowise-components View details

PraisonAIAgents: SSRF via unvalidated URL in `web_crawl` httpx fallback

praisonaiagents View details
CVE MEDIUM CVE-2026-40115

PraisonAI has Unrestricted Upload Size in WSGI Recipe Registry Server

CVSS 6.2 PraisonAI View details

authenticated SSRF via instance-URL header in multi-tenant HTTP mode

CVSS 8.5 n8n-mcp View details
CVE MEDIUM CVE-2026-34753

vLLM: Server-Side Request Forgery (SSRF) in `download_bytes_from

CVSS 5.4 vllm View details
CVE MEDIUM CVE-2026-33682

prior to 1.54.0 running on Windows hosts have an unauthenticated Server-Side Request Forgery (SSRF) vulnerability. The vulnerability arises from improper validation of attacker-supplied filesystem paths. In certain code

CVSS 4.7 Streamlit View details
CVE UNKNOWN CVE-2026-33401

Prior to version 4.7.0, the patch introduced in commit e8a513591 (CVE-2026-30840) added SSRF protection to notification test endpoints but left three additional attack surfaces unprotected: the AI Ollama

ranges (RFC 1918), localhost, or cloud metadata endpoints. This enables Server-Side Request Forgery (SSRF), allowing any user interacting with a publicly exposed chatflow to force

CVSS 8.8 flowise-components View details
CVE CRITICAL CVE-2026-28451

Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image processing. Attackers can influence tool calls through direct manipulation

CVSS 9.3 openclaw View details

package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim

CVSS 8.6 gradio View details

speech voice models. In versions prior to 1.16.0, a Server-Side Request Forgery (SSRF) vulnerability in the asset download endpoint allows authenticated users to make arbitrary HTTP requests from

CVSS 8.5 sillytavern View details

counts for vision-enabled models. This allows attackers to trigger Server-Side Request Forgery (SSRF) attacks by providing malicious image URLs in user input. This vulnerability is fixed

CVSS 3.7 langchain_core View details

workflows with Generative AI. From 0.0.26 to before 1.56.0, aServer-Side Request Forgery (SSRF) vulnerability exists in Pydantic AI's URL download functionality. When applications accept message history from untrusted

CVSS 8.6 pydantic_ai View details

large language models (LLMs). Prior to version 0.14.1, a Server-Side Request Forgery (SSRF) vulnerability exists in the `MediaConnector` class within the vLLM project's multimodal feature set. The load

CVSS 7.1 vllm View details

Chainlit contain a server-side request forgery (SSRF) vulnerability

CVSS 7.7 chainlit View details

Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch

CVSS 7.1 vllm View details

library for large language models. Prior to version 0.9.4, a Server-Side Request Forgery (SSRF) vulnerability in the chat API allows any authenticated user to force the server to make

CVSS 8.1 llamafactory View details

customized large language model flow. In version 3.0.5, a Server-Side Request Forgery (SSRF) vulnerability was discovered in the /api/v1/fetch-links endpoint of the Flowise application. This vulnerability allows an attacker

CVSS 7.5 flowise View details
CVE CRITICAL CVE-2025-2828

Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit component of the langchain-community package (specifically, langchain_community.agent_toolkits.openapi.toolkit.RequestsToolkit) in langchain-ai/langchain version 0.0.27. This vulnerability occurs because the toolkit

CVSS 10.0 langchain View details
Previous Page 3 of 5 Next