Description
A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

A flaw in the client.get function of src/mcp-server.js in huimeicloud hm_editor up to version 2.2.3 allows an attacker to manipulate the url parameter sent to the image‑to‑base64 endpoint, causing the server to perform arbitrary HTTP requests. This server‑side request forgery can be triggered remotely and may expose internal resources or allow data exfiltration. The CWE is 918, highlighting the vulnerability in how the server processes untrusted URL input.

Affected Systems

The vulnerability affects the huimeicloud hm_editor component, specifically all releases up to and including version 2.2.3. Operations consuming the image‑to‑base64 endpoint in any affected deployment are potentially exploitable until a patch or configuration change is applied.

Risk and Exploitability

With a CVSS score of 6.9 the flaw is classified as moderate severity; the exploit is publicly disclosed and may be used by attackers. Exploitation requires only a crafted request to the vulnerable endpoint, making it straightforward for a remote attacker. Due to the absence of an EPSS score and its non‑listing in the KEV catalog, precise exploit likelihood is uncertain, but remote SSRF remains a significant risk to confidentiality and integrity of internal services.

Generated by OpenCVE AI on April 2, 2026 at 16:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of huimeicloud hm_editor that fixes the SSRF issue.
  • If an update is not immediately possible, block outbound traffic from the server to internal networks or restrict the image‑to‑base64 endpoint to trusted sources.
  • Consider disabling the vulnerable image‑to‑base64 endpoint entirely if it is not required for business operations.

Generated by OpenCVE AI on April 2, 2026 at 16:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Huimeicloud
Huimeicloud hm Editor
Vendors & Products Huimeicloud
Huimeicloud hm Editor

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title huimeicloud hm_editor image-to-base64 Endpoint mcp-server.js client.get server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Huimeicloud Hm Editor
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-02T16:22:00.246Z

Reserved: 2026-04-01T16:04:54.992Z

Link: CVE-2026-5346

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T15:16:53.833

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-5346

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:20:14Z

Weaknesses