CVE-2026-6605
Received Received - Intake
Server-Side Request Forgery in Modelscope Agentscope Internal Service

Publication date: 2026-04-20

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in modelscope agentscope up to 1.0.18. This affects the function _get_bytes_from_web_url of the file src/agentscope/_utils/_common.py of the component Internal Service. Performing a manipulation results in server-side request forgery. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-20
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
modelscope agentscope to 1.0.18 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a security flaw found in modelscope agentscope versions up to 1.0.18. It affects the function _get_bytes_from_web_url in the file src/agentscope/_utils/_common.py within the Internal Service component. The flaw allows an attacker to perform server-side request forgery (SSRF) by manipulating this function. This means an attacker can make the server send unauthorized requests to other internal or external resources. The attack can be initiated remotely, and the exploit code has been publicly released.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to make the affected server send unauthorized requests to internal or external systems. This can lead to unauthorized access to internal resources, data leakage, or further exploitation of internal services that are not directly accessible from outside. Since the attack can be performed remotely and the exploit is publicly available, it increases the risk of compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-6605 enables attackers to perform server-side request forgery attacks that can lead to the exfiltration of sensitive internal and cloud metadata information, including cloud credentials and internal service data.

Such unauthorized access and data exfiltration could potentially violate data protection and privacy regulations like GDPR and HIPAA, which require strict controls over sensitive data access and protection against unauthorized disclosure.

However, the provided information does not explicitly mention compliance impacts or specific regulatory considerations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unusual server-side requests initiated by AgentScope, especially those fetching internal or cloud metadata URLs. Look for requests to internal IP ranges or cloud metadata endpoints such as http://169.254.169.254/ in logs or network traffic.

You can also inspect API responses for unexpected base64-encoded content that may indicate exfiltration of internal data.

Suggested commands to detect exploitation attempts include:

  • Using tcpdump or tshark to capture HTTP requests from the AgentScope server to internal IPs or cloud metadata endpoints, e.g.: tcpdump -i eth0 host 169.254.169.254
  • Using grep or similar tools to search server logs for URLs containing suspicious patterns like ".wav" appended to internal or cloud metadata URLs.
  • Monitoring API responses for base64-encoded data that could be decoded to reveal sensitive information.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting the AgentScope service's ability to make outbound HTTP requests to internal or cloud metadata IP addresses.

Implement network-level controls such as firewall rules or egress filtering to block access to sensitive internal IP ranges (e.g., 169.254.169.254 for AWS metadata).

Review and update the AgentScope configuration or code to validate and sanitize URLs before fetching, including blocking private IP ranges and disallowing untrusted URL schemes.

If possible, upgrade to a fixed version of AgentScope once available or apply patches that address the SSRF vulnerability.

Monitor logs and network traffic for signs of exploitation attempts and respond accordingly.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart