PT-2026-33847 · Lmdeploy · Lmdeploy

Published

2026-04-20

·

Updated

2026-04-24

·

CVE-2026-33626

CVSS v3.1

7.5

High

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Name of the Vulnerable Software and Affected Versions LMDeploy versions prior to 0.12.3
Description A Server-Side Request Forgery (SSRF) issue exists in the vision-language module. The load image() and encode image base64() functions in lmdeploy/vl/utils.py fetch arbitrary URLs without validating internal or private IP addresses. This allows attackers to access internal networks, sensitive resources, and cloud metadata services. An attacker can exploit this by sending a request to the '/v1/chat/completions' endpoint using a malicious image url variable.
Recommendations Update to version 0.12.3. As a temporary workaround, restrict access to the load image() and encode image base64() functions or avoid using the image url variable in the '/v1/chat/completions' endpoint until the update is applied.

Exploit

Fix

SSRF

Weakness Enumeration

Related Identifiers

CVE-2026-33626
GHSA-6W67-HWM5-92MQ

Affected Products

Lmdeploy