Description
A vulnerability was detected in Bytedesk up to 1.3.9. Affected is the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/gitee/SpringAIGiteeRestService.java of the component SpringAIGiteeRestController. Performing a manipulation of the argument apiUrl results in server-side request forgery. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 1.4.5.4 is able to address this issue. The patch is named 975e39e4dd527596987559f56c5f9f973f64eff7. Upgrading the affected component is advised.
Published: 2026-03-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery (SSRF)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in Bytedesk’s getModels API, where an attacker can manipulate the apiUrl parameter to cause the server to make arbitrary outbound HTTP requests. This enables remote request forgery, potentially exposing internal resources or data. The flaw is identified as CWE‑918 and is rated with CVSS 5.3, indicating a moderate severity that still allows an attacker to compromise confidentiality or availability of the target system.

Affected Systems

Bytedesk up to and including version 1.3.9 is affected. The component impacted is SpringAIGiteeRestController’s getModels endpoint in SpringAIGiteeRestService.java. Upgrading to release v1.4.5.4, which incorporates commit 975e39e4dd527596987559f56c5f9f973f64eff7, resolves the issue.

Risk and Exploitability

The exploit is publicly available and remote exploitation is feasible because the vulnerable endpoint is reachable from external networks. With an EPSS score of less than 1%, the probability of widespread exploitation is low at present, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, the possibility of sensitive data exposure or service disruption warrants prompt action.

Generated by OpenCVE AI on April 16, 2026 at 04:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Bytedesk application to version 1.4.5.4 to apply the official fix.
  • If an upgrade cannot be performed immediately, disable the getModels API or restrict access to trusted users only.
  • Configure network controls to block all outbound HTTP requests from the application server except those to approved destinations, mitigating the SSRF attack surface.

Generated by OpenCVE AI on April 16, 2026 at 04:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bytedesk:bytedesk:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Bytedesk
Bytedesk bytedesk
Vendors & Products Bytedesk
Bytedesk bytedesk

Sun, 08 Mar 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Bytedesk up to 1.3.9. Affected is the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/gitee/SpringAIGiteeRestService.java of the component SpringAIGiteeRestController. Performing a manipulation of the argument apiUrl results in server-side request forgery. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 1.4.5.4 is able to address this issue. The patch is named 975e39e4dd527596987559f56c5f9f973f64eff7. Upgrading the affected component is advised.
Title Bytedesk SpringAIGiteeRestController SpringAIGiteeRestService.java getModels server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Bytedesk Bytedesk
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T20:27:30.912Z

Reserved: 2026-03-08T07:20:34.086Z

Link: CVE-2026-3789

cve-icon Vulnrichment

Updated: 2026-03-10T20:27:27.730Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T00:16:01.493

Modified: 2026-03-10T18:50:22.767

Link: CVE-2026-3789

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses