Impact
The vulnerability is a server‑side request forgery (SSRF) that originates in the handle_pdf_document function of frdel/agent0ai agent‑zero 0.9.7. By manipulating the pdf document parsing logic, an attacker can force the agent to send HTTP requests to arbitrary URLs. The impact can include unauthorized reading of internal resources, traversal of network boundaries, and potential escalation of an existing compromise. The weakness is a classic SSRF flaw (CWE‑918).
Affected Systems
The affected product is agent‑zero from both agent0ai and frdel, version 0.9.7. The Common Platform Enumeration string for this product is cpe:2.3:a:agent-zero:agent-zero:*:*:*:*:*:*:*:*. No other versions are listed as affected in the current advisory.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. EPSS data is not available and the vulnerability is not listed in the KEV catalog, but a public exploit is available on GitHub and other platforms, indicating that attackers can deliver the SSRF payload remotely. Because the flaw allows the server to initiate requests to any URL, an adversary could probe internal services or exfiltrate data, making the risk higher in environments with open outbound connections.
OpenCVE Enrichment