Impact
A server‑side request forgery (SSRF) vulnerability exists in Bytedesk in the getModels function of SpringAIOpenrouterRestService, allowing attackers to manipulate the apiUrl argument to instruct the server to make arbitrary outbound HTTP requests. This flaw can lead to exposure of internal resources, data leakage, or further lateral movement within the network. The weakness aligns with CWE‑918, and the impact is confined to the integrity and confidentiality of information accessed by the server.
Affected Systems
Users running Bytedesk versions 1.3.9 or earlier are affected. The vulnerability was discovered in the component SpringAIOpenrouterRestController, and an update to version 1.4.5.4 contains the fix. No other vendors or products are listed; the issue is specific to the Bytedesk application.
Risk and Exploitability
The CVSS score of 5.3 denotes moderate severity, and the EPSS score indicates a very low probability of exploitation. Because the flaw can be triggered remotely via crafted input, attackers could leverage it if the application is exposed to untrusted users. The vulnerability is not catalogued in the CISA KEV list, and no publicly released exploit code is confirmed; however, the remote nature and input manipulation suggest that an attacker with network access to the application could exploit the flaw if the server is not properly restricted.
OpenCVE Enrichment