Description
A security vulnerability has been detected in Bytedesk up to 1.3.9. This impacts the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/openrouter/SpringAIOpenrouterRestService.java of the component SpringAIOpenrouterRestController. Such manipulation of the argument apiUrl leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.4.5.4 will fix this issue. The name of the patch is 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component.
Published: 2026-03-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑side request forgery via manipulated apiUrl
Action: Patch
AI Analysis

Impact

A server‑side request forgery (SSRF) vulnerability exists in Bytedesk in the getModels function of SpringAIOpenrouterRestService, allowing attackers to manipulate the apiUrl argument to instruct the server to make arbitrary outbound HTTP requests. This flaw can lead to exposure of internal resources, data leakage, or further lateral movement within the network. The weakness aligns with CWE‑918, and the impact is confined to the integrity and confidentiality of information accessed by the server.

Affected Systems

Users running Bytedesk versions 1.3.9 or earlier are affected. The vulnerability was discovered in the component SpringAIOpenrouterRestController, and an update to version 1.4.5.4 contains the fix. No other vendors or products are listed; the issue is specific to the Bytedesk application.

Risk and Exploitability

The CVSS score of 5.3 denotes moderate severity, and the EPSS score indicates a very low probability of exploitation. Because the flaw can be triggered remotely via crafted input, attackers could leverage it if the application is exposed to untrusted users. The vulnerability is not catalogued in the CISA KEV list, and no publicly released exploit code is confirmed; however, the remote nature and input manipulation suggest that an attacker with network access to the application could exploit the flaw if the server is not properly restricted.

Generated by OpenCVE AI on April 16, 2026 at 04:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Bytedesk to v1.4.5.4 or later, which patches the SSRF flaw.
  • If upgrading immediately is not possible, restrict the Bytedesk service’s outbound network traffic to a whitelist of trusted domains or approved addresses, preventing unauthorized external requests.
  • Implement input validation for the apiUrl parameter so that only allowed schemes (such as https) and approved hostnames are accepted, thereby blocking malformed or dangerous URLs.

Generated by OpenCVE AI on April 16, 2026 at 04:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bytedesk:bytedesk:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Bytedesk
Bytedesk bytedesk
Vendors & Products Bytedesk
Bytedesk bytedesk

Sun, 08 Mar 2026 23:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Bytedesk up to 1.3.9. This impacts the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/openrouter/SpringAIOpenrouterRestService.java of the component SpringAIOpenrouterRestController. Such manipulation of the argument apiUrl leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.4.5.4 will fix this issue. The name of the patch is 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component.
Title Bytedesk SpringAIOpenrouterRestController SpringAIOpenrouterRestService.java getModels server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Bytedesk Bytedesk
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T20:24:19.510Z

Reserved: 2026-03-08T07:20:23.877Z

Link: CVE-2026-3788

cve-icon Vulnrichment

Updated: 2026-03-10T20:24:15.319Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T00:16:01.247

Modified: 2026-03-10T18:50:39.197

Link: CVE-2026-3788

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses