Impact
The vulnerability resides in Bytedesk’s getModels API, where an attacker can manipulate the apiUrl parameter to cause the server to make arbitrary outbound HTTP requests. This enables remote request forgery, potentially exposing internal resources or data. The flaw is identified as CWE‑918 and is rated with CVSS 5.3, indicating a moderate severity that still allows an attacker to compromise confidentiality or availability of the target system.
Affected Systems
Bytedesk up to and including version 1.3.9 is affected. The component impacted is SpringAIGiteeRestController’s getModels endpoint in SpringAIGiteeRestService.java. Upgrading to release v1.4.5.4, which incorporates commit 975e39e4dd527596987559f56c5f9f973f64eff7, resolves the issue.
Risk and Exploitability
The exploit is publicly available and remote exploitation is feasible because the vulnerable endpoint is reachable from external networks. With an EPSS score of less than 1%, the probability of widespread exploitation is low at present, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, the possibility of sensitive data exposure or service disruption warrants prompt action.
OpenCVE Enrichment