CVE-2026-3788
Received Received - Intake
Server-Side Request Forgery in Bytedesk SpringAIOpenrouterRestController

Publication date: 2026-03-09

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security vulnerability has been detected in Bytedesk up to 1.3.9. This impacts the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/openrouter/SpringAIOpenrouterRestService.java of the component SpringAIOpenrouterRestController. Such manipulation of the argument apiUrl leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.4.5.4 will fix this issue. The name of the patch is 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-09
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bytedesk bytedesk to 1.4.5.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3788 is a Server-Side Request Forgery (SSRF) vulnerability in the Bytedesk project, specifically affecting the getModels function in the SpringAIOpenrouterRestController component. The vulnerability occurs because the apiUrl parameter, supplied by the user, is used directly in an HTTP request without validation or allowlist enforcement. This allows an attacker to supply a malicious URL, causing the server to make unauthorized outbound HTTP requests to arbitrary hosts controlled by the attacker.

Technically, the vulnerable code uses the RestTemplate.exchange() method to perform a GET request to a URL constructed from the user-supplied apiUrl parameter. Since there is no validation, attackers can exploit this to make the server interact with internal network resources or cloud metadata endpoints.


How can this vulnerability impact me? :

This vulnerability can have several impacts including unauthorized internal network scanning, access to sensitive cloud metadata services, and potential credential theft. Attackers can manipulate the server to make requests to internal or external systems that the server has access to, which can lead to data exposure or further compromise.

Because the server makes outbound requests based on attacker-controlled input, it can be used to bypass network restrictions, gather information about internal infrastructure, or exfiltrate data.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unusual outbound HTTP requests originating from the Bytedesk server, especially requests to unexpected or attacker-controlled domains triggered by the apiUrl parameter in the GET /openrouter/api/v1/models endpoint.'}, {'type': 'paragraph', 'content': 'One practical detection method is to analyze DNS logs or network traffic for outbound requests to suspicious or unknown domains that could indicate exploitation attempts.'}, {'type': 'paragraph', 'content': 'Additionally, reviewing server logs for requests to the vulnerable endpoint with unusual or external apiUrl parameter values can help identify exploitation.'}, {'type': 'list_item', 'content': 'Use network monitoring tools (e.g., tcpdump, Wireshark) to capture outbound HTTP requests from the server.'}, {'type': 'list_item', 'content': 'Check DNS query logs for requests to attacker-controlled or unexpected domains.'}, {'type': 'list_item', 'content': 'Search application logs for HTTP GET requests to /openrouter/api/v1/models with suspicious apiUrl parameters.'}, {'type': 'list_item', 'content': "Example command to monitor outbound HTTP requests on port 80 or 443: sudo tcpdump -i eth0 'tcp dst port 80 or tcp dst port 443'"}, {'type': 'list_item', 'content': "Example command to search logs for suspicious apiUrl usage: grep -i 'apiUrl=' /path/to/bytedesk/logs/access.log"}] [1, 4]


What immediate steps should I take to mitigate this vulnerability?

The primary and recommended mitigation step is to upgrade Bytedesk to version 1.4.5.4, which contains the patch that fixes this SSRF vulnerability.

The patch (commit ID: 975e39e4dd527596987559f56c5f9f973f64eff7) addresses the issue by properly validating or restricting the apiUrl parameter to prevent malicious URL injection.

Until the upgrade can be applied, consider restricting outbound HTTP requests from the Bytedesk server to only trusted destinations using firewall rules or network policies to limit potential exploitation.

Also, monitor logs and network traffic for signs of exploitation attempts as a temporary detection measure.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart