Impact
The flaw resides in MetaGPT's decode_image function. By supplying a crafted URL or base64 string, an attacker can force the server to send requests to arbitrary destinations. The bug can be triggered remotely and the public exploit code is available, indicating that it may be actively abused. The weakness is a classic SSRF (CWE‑918) that could allow an attacker to perform internal network reconnaissance or further compromise.
Affected Systems
FoundationAgents MetaGPT versions up to 0.8.1 are affected. No other versions were identified in the CNA data; if deploying MetaGPT 0.8.1 or earlier, users should seek updates.
Risk and Exploitability
With a CVSS score of 5.3 the vulnerability is moderate. No EPSS score or KEV listing is available. The vulnerability can be exploited over the network without authentication if the decode_image endpoint is exposed. Attackers can use the public exploit to trigger SSRF immediately. Mitigation relies on patching or restricting outbound traffic.
OpenCVE Enrichment
Github GHSA