Description
A vulnerability was found in assafelovic gpt-researcher up to 3.4.3. This impacts an unknown function of the component HTTP REST API Endpoint. Performing a manipulation results in missing authentication. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass
Action: Apply patch
AI Analysis

Impact

A missing authentication check was discovered in the HTTP REST API endpoint of the assafelovic:gpt-researcher component. The flaw allows an attacker to invoke an undeclared function without providing credentials, enabling unauthorized use of the API and potentially exposing sensitive data or control over the system. The weakness corresponds to CWE‑287 and CWE‑306 and represents a moderate severity issue, as quantified by a CVSS score of 6.9.

Affected Systems

Systems that run assafelovic:gpt-researcher versions up to 3.4.3 are vulnerable. The vulnerability affects any deployment of the component where the malicious function is exposed through the REST interface, regardless of the host environment or operating system.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate risk, while the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Because the flaw can be triggered remotely via the HTTP interface, it is likely that attackers can exploit it from the public internet once the vulnerable instance is reachable. Public proof‑of‑concept code has already been released, but the project maintainer has not issued a patch or issued a response, increasing the window of exposure.

Generated by OpenCVE AI on April 6, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the gpt-researcher version running on your infrastructure and confirm it is higher than 3.4.3.
  • Install a newer release or patch that addresses the missing authentication, if one is available from the vendor.
  • Until a patch can be applied, restrict network access to the REST API with firewall rules or place the service behind a VPN so only trusted hosts can reach it.
  • Enable logging of authentication attempts and monitor for suspicious activity against the API endpoints.

Generated by OpenCVE AI on April 6, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Assafelovic
Assafelovic gpt-researcher
Vendors & Products Assafelovic
Assafelovic gpt-researcher

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in assafelovic gpt-researcher up to 3.4.3. This impacts an unknown function of the component HTTP REST API Endpoint. Performing a manipulation results in missing authentication. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
Title assafelovic gpt-researcher HTTP REST API Endpoint missing authentication
Weaknesses CWE-287
CWE-306
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Assafelovic Gpt-researcher
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T18:30:24.574Z

Reserved: 2026-04-05T19:12:45.586Z

Link: CVE-2026-5632

cve-icon Vulnrichment

Updated: 2026-04-06T18:30:16.683Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T07:16:02.197

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5632

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:17Z

Weaknesses