Description
A weakness has been identified in huggingface smolagents 1.24.0. Impacted is the function requests.get/requests.post of the component LocalPythonExecutor. Executing a manipulation can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-18
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑side request forgery
Action: Assess Mitigation
AI Analysis

Impact

The vulnerability exists in the LocalPythonExecutor module of huggingface smolagents 1.24.0, where an attacker can supply arbitrary URLs to the requests.get or requests.post functions. This allows a remote malicious actor to induce the server to perform HTTP requests to any IP or domain under the attacker’s control, potentially revealing internal network information, exfiltrating data, or interacting with other services without authentication. The weakness qualifies as CWE‑918. The impact is therefore a server‑side request forgery that can lead to information disclosure or further compromise of internal resources.

Affected Systems

The affected product is HuggingFace smolagents, version 1.24.0. No additional vendor or product variations are listed. Systems running this exact version directly expose the vulnerable component.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. However, a public exploit has been released, and the EPSS score of less than 1% shows that while exploitation is technically possible, it has not yet seen widespread real‑world use. The vulnerability is not yet listed in the CISA KEV catalog, so it is not classified as a known exploited vulnerability at this time. The attack vector is remote; an attacker can trigger the flaw over the network without any local access, making immediate attention advisable even though the likelihood of exploitation remains low.

Generated by OpenCVE AI on April 17, 2026 at 18:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disable or remove the LocalPythonExecutor feature until a vendor‑issued fix is available
  • Implement network controls to block outbound HTTP requests originating from the smolagents process, such as firewall rules or container network policies
  • Check for and install any available updates or patches for smolagents that address SSRF concerns, then verify that the vulnerability is no longer present

Generated by OpenCVE AI on April 17, 2026 at 18:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:huggingface:smolagents:*:*:*:*:*:*:*:*

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Huggingface
Huggingface smolagents
Vendors & Products Huggingface
Huggingface smolagents

Wed, 18 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 13:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in huggingface smolagents 1.24.0. Impacted is the function requests.get/requests.post of the component LocalPythonExecutor. Executing a manipulation can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title huggingface smolagents LocalPythonExecutor requests.post server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Huggingface Smolagents
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:17:31.637Z

Reserved: 2026-02-18T06:39:02.728Z

Link: CVE-2026-2654

cve-icon Vulnrichment

Updated: 2026-02-18T14:11:14.092Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T14:16:07.277

Modified: 2026-02-20T20:51:16.650

Link: CVE-2026-2654

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:45:25Z

Weaknesses