Description
A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown processing of the file backend/app/api/v1/endpoints/embedding_config.py of the component IP Address Handler. Performing a manipulation results in server-side request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.0.4 and 3.1.0 is capable of addressing this issue. The patch is named da853fdd8cbe9d42053b45d83f25708ba29b8b27. It is suggested to upgrade the affected component.
Published: 2026-02-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises from improper handling of IP address input in the embedding_config.py module of DeepAudit. This flaw allows an attacker to craft a request that causes the server to make outbound HTTP requests to arbitrary URLs. The result is that the compromised server can reach internal or external resources, potentially leaking sensitive data or interacting with services that should be inaccessible. The weakness is a Server‑Side Request Forgery, identified as CWE‑918.

Affected Systems

DeepAudit distributed by lintsinghua is vulnerable in all releases up to version 3.0.3. Versions 3.0.4 and 3.1.0 include a patch that eliminates the flaw. The vulnerability is present in the IP Address Handler component of backend/app/api/v1/endpoints/embedding_config.py.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk. EPSS is less than 1%, suggesting a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger the issue remotely by sending specially crafted data to the affected endpoint. Because the flaw permits arbitrary outbound requests, potential lateral movement or data exfiltration is possible, but exploitation would first require interaction with a vulnerable DeepAudit instance.

Generated by OpenCVE AI on April 17, 2026 at 19:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade DeepAudit to version 3.0.4 or 3.1.0.
  • Apply the patch commit da853fdd8cbe9d42053b45d83f25708ba29b8b27 to the embedding_config.py module if the framework version cannot be upgraded immediately.
  • Restrict the DeepAudit server’s outbound traffic to only trusted destinations using firewall rules or network ACLs.
  • Implement strict input validation and sanitization on IP address fields to reject URLs or malformed data.
  • If an upgrade is not possible, isolate the vulnerable DeepAudit instance from the internal network to prevent SSRF from reaching sensitive resources.

Generated by OpenCVE AI on April 17, 2026 at 19:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Feb 2026 00:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:lintsinghua:deepaudit:*:*:*:*:*:*:*:*

Tue, 17 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Lintsinghua
Lintsinghua deepaudit
Vendors & Products Lintsinghua
Lintsinghua deepaudit

Mon, 16 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown processing of the file backend/app/api/v1/endpoints/embedding_config.py of the component IP Address Handler. Performing a manipulation results in server-side request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.0.4 and 3.1.0 is capable of addressing this issue. The patch is named da853fdd8cbe9d42053b45d83f25708ba29b8b27. It is suggested to upgrade the affected component.
Title lintsinghua DeepAudit IP Address embedding_config.py server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Lintsinghua Deepaudit
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:04:56.694Z

Reserved: 2026-02-15T09:08:25.777Z

Link: CVE-2026-2532

cve-icon Vulnrichment

Updated: 2026-02-17T16:04:58.271Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T04:15:52.093

Modified: 2026-02-28T00:38:08.223

Link: CVE-2026-2532

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T19:30:15Z

Weaknesses