Description
A vulnerability was identified in modelscope agentscope up to 1.0.18. Affected by this issue is the function _parse_url/prepare_image/openai_audio_to_text of the file src/agentscope/tool/_multi_modality/_openai_tools.py of the component Cloud Metadata Endpoint. Such manipulation of the argument image_url/audio_file_url leads to server-side request forgery. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: Server‑Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

The flaw lies in a routine that parses image and audio URLs within ModelScope Agentscope’s Cloud Metadata Endpoint. By supplying a crafted URL, an attacker can force the application to perform internal or external HTTP requests, potentially accessing sensitive resources or exfiltrating data. The issue can be leveraged remotely, and the exploit code is publicly available. The weakness is a typical SSRF vulnerability, identified by the Common Weakness Enumeration CWE‑918. The reported CVSS score of 6.9 reflects a moderate risk to confidentiality and integrity for affected systems.

Affected Systems

Systems running ModelScope Agentscope version 1.0.18 or earlier are vulnerable. The weakness resides in the file src/agentscope/tool/_multi_modality/_openai_tools.py, particularly within the _parse_url/prepare_image/openai_audio_to_text function that handles user‑supplied image_url and audio_file_url arguments. Any deployment of the affected software that accepts external URLs is at risk.

Risk and Exploitability

The CVSS metric indicates moderate severity, but the absence of an EPSS score means the likelihood of exploitation in the wild cannot be quantified from the provided data. The vulnerability is not listed in CISA KEV, suggesting it has not yet been confirmed as exploited at scale. Nonetheless, the publicly available exploit code and the remote nature of the attack vector make SSRF a significant concern, especially if the application has unrestricted outbound network connectivity.

Generated by OpenCVE AI on April 20, 2026 at 06:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ModelScope Agentscope to version 1.0.19 or later (or any patch that addresses the SSRF in _openai_tools.py).
  • Implement input validation that restricts image_url and audio_file_url to trusted domains or a safe whitelist of hosts.;
  • Configure outbound network rules or a proxy to limit the application’s ability to reach arbitrary internal or external services;

Generated by OpenCVE AI on April 20, 2026 at 06:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in modelscope agentscope up to 1.0.18. Affected by this issue is the function _parse_url/prepare_image/openai_audio_to_text of the file src/agentscope/tool/_multi_modality/_openai_tools.py of the component Cloud Metadata Endpoint. Such manipulation of the argument image_url/audio_file_url leads to server-side request forgery. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title modelscope agentscope Cloud Metadata Endpoint _openai_tools.py openai_audio_to_text server-side request forgery
First Time appeared Modelscope
Modelscope agentscope
Weaknesses CWE-918
CPEs cpe:2.3:a:modelscope:agentscope:*:*:*:*:*:*:*:*
Vendors & Products Modelscope
Modelscope agentscope
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Modelscope Agentscope
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T04:15:11.588Z

Reserved: 2026-04-19T14:11:56.518Z

Link: CVE-2026-6604

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-20T05:16:15.567

Modified: 2026-04-20T05:16:15.567

Link: CVE-2026-6604

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T07:00:11Z

Weaknesses