Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
GHSA-3f6c-7fw2-ppm4 | vLLM is vulnerable to Server-Side Request Forgery (SSRF) through `MediaConnector` class |
Solution
No solution given by the vendor.
Workaround
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Wed, 08 Oct 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 07 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Oct 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch and process media from user-provided URLs without adequate restrictions on the target hosts. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources. | |
Title | Vllm: server side request forgery (ssrf) in mediaconnector | |
First Time appeared |
Redhat
Redhat ai Inference Server Redhat enterprise Linux Ai |
|
Weaknesses | CWE-918 | |
CPEs | cpe:/a:redhat:ai_inference_server:3 cpe:/a:redhat:enterprise_linux_ai:1 |
|
Vendors & Products |
Redhat
Redhat ai Inference Server Redhat enterprise Linux Ai |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-07T19:57:03.472Z
Reserved: 2025-06-18T15:26:11.100Z
Link: CVE-2025-6242

Updated: 2025-10-07T19:55:32.062Z

Status : Awaiting Analysis
Published: 2025-10-07T20:15:36.187
Modified: 2025-10-08T19:38:09.863
Link: CVE-2025-6242


No data.