Impact
A server‑side request forgery flaw in Fal.ai media status polling allows an authenticated user to supply an attacker‑controlled URL in the token parameter. This lack of URL validation enables the server to issue arbitrary outbound requests and expose the Fal.ai API key in the Authorization header. The result is credential theft, internal network probing, and the abusive use of the victim’s Fal.ai account.
Affected Systems
The vulnerability is present in prompts.chat deployments running any code prior to commit 30a8f04. Users and administrators should verify the version in use and determine whether the affected code base remains in production.
Risk and Exploitability
The flaw has a CVSS score of 7.1, indicating moderate‑to‑high severity, yet the EPSS score is below 1% and it is not listed in the CISA KEV catalog, suggesting a low probability of widespread exploitation. The attack requires authentication to the service, which limits the attack surface, but the potential to exfiltrate sensitive keys and probe internal resources makes it a significant risk if unpatched.
OpenCVE Enrichment