Description
A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Markdown image links and performs a blocking HTTP GET request, reading the entire response body into memory and cloning it before decoding. This behavior can lead to resource exhaustion, including network bandwidth saturation, memory inflation, and CPU overutilization. The vulnerability is triggered even if the request is later rejected for exceeding token limits. The default deployment configuration, which lacks memory usage limits and authentication, exacerbates the impact, potentially crashing the host machine. The issue is resolved in version 3.3.7.
Published: 2026-02-02
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Resource exhaustion by unbounded external image fetching
Action: Patch
AI Analysis

Impact

The vulnerability allows unauthenticated remote attackers to trigger resource exhaustion by providing Markdown image links that are fetched and fully buffered during input validation in VLM mode. The router performs blocking HTTP GET requests, reads the entire response body into memory, and clones it before decoding. This can saturate network bandwidth, inflate memory usage, and overburden the CPU. Attackers can cause the host to crash or become unusable, even if the request is later rejected for exceeding token limits. The effect is a denial‑of‑service that impacts confidentiality is low but availability high and integrity is not directly affected.

Affected Systems

Huggingface’s text‑generation‑inference component, specifically the 3.3.6 release. The default deployment configuration is particularly vulnerable because it lacks authentication and does not impose memory usage limits, making the host susceptible to a crash or sustained denial of service. No other versions or products are listed as affected.

Risk and Exploitability

The CVSS score of 7.5 indicates a high‑severity flaw, while the EPSS score of less than 1%% suggests a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it remotely by sending a crafted request containing an external image link that the server will attempt to fetch, hence the likely attack vector is an unauthenticated HTTP request with a Markdown payload. No additional conditions are required beyond access to the VLM mode of the inference service.

Generated by OpenCVE AI on April 18, 2026 at 00:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Huggingface text‑generation‑inference component to version 3.3.7 or later to address the bug.
  • Configure the deployment with memory usage limits and resource quotas to prevent a single request from exhausting host resources.
  • Enable authentication and restrict or disable VLM mode, or disable external image fetching during input validation to mitigate the risk of unbounded resource consumption.

Generated by OpenCVE AI on April 18, 2026 at 00:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j7x9-7j54-2v3h Hugging Face Text Generation Inference vulnerable to Uncontrolled Resource Consumption
History

Wed, 04 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Huggingface
Huggingface text-generation-inference
Vendors & Products Huggingface
Huggingface text-generation-inference

Mon, 02 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Markdown image links and performs a blocking HTTP GET request, reading the entire response body into memory and cloning it before decoding. This behavior can lead to resource exhaustion, including network bandwidth saturation, memory inflation, and CPU overutilization. The vulnerability is triggered even if the request is later rejected for exceeding token limits. The default deployment configuration, which lacks memory usage limits and authentication, exacerbates the impact, potentially crashing the host machine. The issue is resolved in version 3.3.7.
Title Unbounded External Image Fetch in Validation Leads to Resource-Exhaustion DoS in huggingface/text-generation-inference
Weaknesses CWE-400
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Huggingface Text-generation-inference
cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2026-02-02T12:49:08.220Z

Reserved: 2026-01-05T11:35:41.938Z

Link: CVE-2026-0599

cve-icon Vulnrichment

Updated: 2026-02-02T12:49:04.489Z

cve-icon NVD

Status : Deferred

Published: 2026-02-02T11:16:17.773

Modified: 2026-04-15T14:34:27.800

Link: CVE-2026-0599

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:45:32Z

Weaknesses