CVE-2026-22664
Received Received - Intake
Server-Side Request Forgery in prompts.chat Fal.ai Media Polling

Publication date: 2026-04-03

Last updated on: 2026-04-13

Assigner: VulnCheck

Description
prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token parameter. Attackers can exploit the lack of URL validation to disclose the FAL_API_KEY in the Authorization header, enabling credential theft, internal network probing, and abuse of the victim's Fal.ai account.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-04-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fka prompts.chat to 2026-03-25 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows attackers to steal credentials (FAL_API_KEY), perform internal network probing, and abuse the victim's Fal.ai account by exploiting a server-side request forgery flaw. Such unauthorized access and credential theft can lead to data breaches and unauthorized data exposure.

Consequently, this vulnerability may impact compliance with standards and regulations like GDPR and HIPAA, which require protection of sensitive data and secure access controls. The exposure of credentials and potential unauthorized access could result in violations of these regulations' requirements for data confidentiality and integrity.


Can you explain this vulnerability to me?

This vulnerability is a server-side request forgery (SSRF) issue in prompts.chat prior to commit 30a8f04, specifically in the Fal.ai media status polling feature.

Authenticated users can exploit this vulnerability by supplying attacker-controlled URLs in the token parameter, which lacks proper URL validation.

This allows attackers to make arbitrary outbound requests from the server.

As a result, attackers can disclose the FAL_API_KEY found in the Authorization header, leading to credential theft, internal network probing, and abuse of the victim's Fal.ai account.


How can this vulnerability impact me? :

The vulnerability can have several impacts:

  • Credential theft by exposing the FAL_API_KEY.
  • Internal network probing, which could reveal sensitive internal infrastructure.
  • Abuse of the victim's Fal.ai account, potentially leading to unauthorized actions or data access.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart