Description
A vulnerability was determined in assafelovic gpt-researcher up to 3.4.3. Affected is an unknown function of the component ws Endpoint. Executing a manipulation of the argument source_urls can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

The flaw in the ws endpoint of gpt‑researcher allows an attacker to control the source_urls parameter, causing the server to send HTTP requests to arbitrary destinations. This can lead to unauthorized data access, credential theft, or reconnaissance against internal services. The problem is identified as a server‑side request forgery (CWE‑918).

Affected Systems

The vulnerability affects the open‑source gpt‑researcher utility maintained under assafelovic. Versions up to 3.4.3 are vulnerable; newer releases have not been confirmed to contain a fix. The tool is often deployed in research environments that expose the ws endpoint.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity; no public EPSS score is available, and the issue is not listed in CISA's Known Exploited Vulnerabilities catalog. Nonetheless, the flaw can be triggered remotely through crafted source_urls without authentication, making exposed deployments susceptible to compromise.

Generated by OpenCVE AI on April 6, 2026 at 10:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade gpt‑researcher to the latest release once a fix is published
  • Disable or restrict the ws endpoint to trusted IP ranges if an upgrade cannot be performed immediately
  • Validate source_urls to allow only whitelisted domains and schemes, rejecting relative or disallowed protocols
  • Monitor outbound traffic from gpt‑researcher for unexpected external requests and set up alerts
  • Continuously check the GitHub repository and issue tracker for updates or community workarounds

Generated by OpenCVE AI on April 6, 2026 at 10:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Assafelovic
Assafelovic gpt-researcher
Vendors & Products Assafelovic
Assafelovic gpt-researcher

Mon, 06 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in assafelovic gpt-researcher up to 3.4.3. Affected is an unknown function of the component ws Endpoint. Executing a manipulation of the argument source_urls can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Title assafelovic gpt-researcher ws Endpoint server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Assafelovic Gpt-researcher
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T12:25:13.754Z

Reserved: 2026-04-05T19:12:48.549Z

Link: CVE-2026-5633

cve-icon Vulnrichment

Updated: 2026-04-06T12:25:06.450Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T08:16:39.487

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5633

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:16Z

Weaknesses