Impact
The vulnerability arises from improper handling of IP address input in the embedding_config.py module of DeepAudit. This flaw allows an attacker to craft a request that causes the server to make outbound HTTP requests to arbitrary URLs. The result is that the compromised server can reach internal or external resources, potentially leaking sensitive data or interacting with services that should be inaccessible. The weakness is a Server‑Side Request Forgery, identified as CWE‑918.
Affected Systems
DeepAudit distributed by lintsinghua is vulnerable in all releases up to version 3.0.3. Versions 3.0.4 and 3.1.0 include a patch that eliminates the flaw. The vulnerability is present in the IP Address Handler component of backend/app/api/v1/endpoints/embedding_config.py.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate risk. EPSS is less than 1%, suggesting a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger the issue remotely by sending specially crafted data to the affected endpoint. Because the flaw permits arbitrary outbound requests, potential lateral movement or data exfiltration is possible, but exploitation would first require interaction with a vulnerable DeepAudit instance.
OpenCVE Enrichment