← back

CVE-2026-33626

HIGH · 7.5
hype MIXED · 38 hack

Patch exists; "in the wild" claims unsubstantiated; no KEV, no confirmed PoC, amplified social panic.

What: Server-Side Request Forgery (SSRF) in LMDeploy's load_image() function (vision-language module) allowing unauthenticated access to cloud metadata and internal networks. CVSS 7.5 HIGH.

Why it matters: Patch available (v0.12.3 released 2026-04-20), but not KEV-listed yet. Social chatter claims "in the wild" exploitation within 13 hours of disclosure—however, this claim lacks credible PoC links or defender triage reports. LLM inference pipelines handling untrusted image URLs are at risk if unpatched.

Where it's seen: Viral alarm posts on X and Bluesky repeating "exploited in the wild" headline; no public PoC repo, no vendor emergency advisory beyond normal patch release, no CISA KEV listing yet.

RISK: HIGH — SSRF to metadata/internal networks in production LLM infrastructure; patch available but adoption unclear.

Generated by claude-haiku-4-5 from public posts and authoritative metadata. AI can make mistakes — verify against vendor advisories before acting. 5/3/2026, 10:05:40 AM

Public PoCs on GitHub 5 repos

Articles & coverage 15 articles

Page 1 of 3
NVD details 1 CWE ·1 vendor · 5 refs expand

Description

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.

Weaknesses

Vendors

  • internlm

Products

  • lmdeploy

References

Top posts driving the trend