Impact
The CVE involves a server‑side request forgery flaw in letta‑ai letta where a malicious ImageContent argument supplied to the _convert_message_create_to_message function in the File URL handler causes the application to perform outbound HTTP requests to attacker‑controlled URLs. This CWE‑918 weakness permits an attacker to invoke requests to internal or remote systems, potentially leading to information disclosure, unauthorized data exfiltration, or further exploitation of internal resources. The impact primarily affects confidentiality and integrity of the systems reachable from the application server.
Affected Systems
The only affected product identified by the CNA is letta‑ai letta, specifically version 0.16.4. No other affected versions or vendors are listed. Users operating that exact release are at risk until a vendor‑issued fix or mitigation is applied.
Risk and Exploitability
The CVSS base score of 5.3 indicates a moderate severity, while the EPSS score is not available and the vulnerability is not listed in the KEV catalog. The description confirms that a remote attacker can trigger the flaw through crafted requests, but the lack of an EPSS score leaves exploitation likelihood uncertain yet present. An attacker could use this vulnerability to reach internal services, transmit sensitive data, or chain additional attacks depending on the network topology.
OpenCVE Enrichment