Impact
The vulnerability in modelscope agentscope arises from a flaw in the _process_audio_block function that permits an attacker to manipulate a URL parameter. This creates a server‑side request forgery (SSRF) scenario in which the server, acting as a proxy, can be forced to send HTTP requests to arbitrary internal or external destinations. The effect is that a remote attacker could exfiltrate sensitive data, access network‑restricted services, or launch further attacks from the compromised host. According to the provided score, the CVSS rating reflects a moderately high risk.
Affected Systems
The issue affects all releases of modelscope agentscope up to and including version 1.0.18 as identified by the vendor. Any deployment that has not been upgraded beyond this version is vulnerable.
Risk and Exploitability
The flaw can be exploited remotely, and a public proof‑of‑concept has already appeared online, indicating that attackers can effectively leverage the weakness. While the EPSS score is not available, the existence of a public exploit suggests that the likelihood of real‑world attacks is non‑negligible. The vulnerability is not listed in CISA’s KEV catalog, but its nature and available exploit code make it a threat that should be addressed without delay.
OpenCVE Enrichment