Impact
The vulnerability exists in the LocalPythonExecutor module of huggingface smolagents 1.24.0, where an attacker can supply arbitrary URLs to the requests.get or requests.post functions. This allows a remote malicious actor to induce the server to perform HTTP requests to any IP or domain under the attacker’s control, potentially revealing internal network information, exfiltrating data, or interacting with other services without authentication. The weakness qualifies as CWE‑918. The impact is therefore a server‑side request forgery that can lead to information disclosure or further compromise of internal resources.
Affected Systems
The affected product is HuggingFace smolagents, version 1.24.0. No additional vendor or product variations are listed. Systems running this exact version directly expose the vulnerable component.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. However, a public exploit has been released, and the EPSS score of less than 1% shows that while exploitation is technically possible, it has not yet seen widespread real‑world use. The vulnerability is not yet listed in the CISA KEV catalog, so it is not classified as a known exploited vulnerability at this time. The attack vector is remote; an attacker can trigger the flaw over the network without any local access, making immediate attention advisable even though the likelihood of exploitation remains low.
OpenCVE Enrichment