Description
A weakness has been identified in SmythOS sre up to 0.0.15. This impacts an unknown function of the file packages/sdk/src/LLM/utils.ts of the component Connector Service. This manipulation of the argument baseURL causes information disclosure. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-26
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

SmythOS sre, up to version 0.0.15, contains a weakness in the Connector Service’s utils.ts component that allows manipulation of the baseURL argument to reveal sensitive information. The flaw is characterized by improper input validation and inadequate access controls, as reflected by CWE‑200 and CWE‑284. An attacker can trigger the disclosure remotely, exposing data that should be protected by confidentiality requirements.

Affected Systems

The affected product is SmythOS sre. All installations of versions 0.0.15 and earlier are vulnerable; the precise function that is compromised lives in packages/sdk/src/LLM/utils.ts.

Risk and Exploitability

The CVSS score of 5.1 places the vulnerability in the medium risk range, and the EPSS score of less than 1% indicates that, at present, the probability of real‑world exploitation is low. However, the issue is not listed in the CISA KEV catalog, which could allow it to be overlooked. The attack vector is inferred to be remote based on the description, and the disclosure is publicly available, meaning that an attacker could exploit it without prior interaction with the vendor.

Generated by OpenCVE AI on April 28, 2026 at 05:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SmythOS sre to a version newer than 0.0.15 once a vendor patch is released.
  • Limit external exposure of the Connector Service by restricting its network interfaces to trusted hosts only.
  • Implement logging and monitoring for abnormal baseURL manipulation attempts and review logs regularly for suspicious activity.

Generated by OpenCVE AI on April 28, 2026 at 05:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Smythos
Smythos sre
Vendors & Products Smythos
Smythos sre

Mon, 27 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in SmythOS sre up to 0.0.15. This impacts an unknown function of the file packages/sdk/src/LLM/utils.ts of the component Connector Service. This manipulation of the argument baseURL causes information disclosure. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title SmythOS sre Connector Service utils.ts information disclosure
Weaknesses CWE-200
CWE-284
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:31:51.415Z

Reserved: 2026-04-25T13:52:21.716Z

Link: CVE-2026-7021

cve-icon Vulnrichment

Updated: 2026-04-27T13:09:23.156Z

cve-icon NVD

Status : Deferred

Published: 2026-04-26T06:16:00.670

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7021

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:30:23Z

Weaknesses