Impact
The vulnerability resides in the file server/download.go component of the Ollama Model Pull API, enabling server‑side request forgery (SSRF). By manipulating the API request, an attacker can cause the Ollama server to send arbitrary HTTP requests to internal or external resources. This can lead to unauthorized data retrieval, potential exposure of sensitive information, or serve as a pivot for further attacks. The weakness is classified as CWE‑918.
Affected Systems
Affected systems are instances of Ollama version 18.1 or earlier. The flaw exists in all releases up to 18.1, but no earlier versions are identified as vulnerable. Users running these versions are at risk if the Model Pull API is exposed to external traffic.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalogue. The attack vector is remote, relying on external manipulation of the download endpoint. No authentication requirement is mentioned, suggesting that any client able to reach the API could exploit the flaw, thus the threat is significant for publicly exposed instances.
OpenCVE Enrichment