Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10481: CWE-352 Cross-Site Request Forgery (CSRF) in comfyanonymous comfyanonymous/comfyui

0
Medium
VulnerabilityCVE-2024-10481cvecve-2024-10481cwe-352
Published: Thu Mar 20 2025 (03/20/2025, 10:09:02 UTC)
Source: CVE Database V5
Vendor/Project: comfyanonymous
Product: comfyanonymous/comfyui

Description

A CSRF vulnerability exists in comfyanonymous/comfyui versions up to v0.2.2. This vulnerability allows attackers to host malicious websites that, when visited by authenticated ComfyUI users, can perform arbitrary API requests on behalf of the user. This can be exploited to perform actions such as uploading arbitrary files via the `/upload/image` endpoint. The lack of CSRF protections on API endpoints like `/upload/image`, `/prompt`, and `/history` leaves users vulnerable to unauthorized actions, which could be combined with other vulnerabilities such as stored-XSS to further compromise user sessions.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:14:19 UTC

Technical Analysis

CVE-2024-10481 identifies a CSRF vulnerability in the comfyanonymous/comfyui project, specifically in versions up to v0.2.2. The vulnerability arises because critical API endpoints such as /upload/image, /prompt, and /history do not implement CSRF protections, allowing attackers to craft malicious websites that, when visited by authenticated users, cause the browser to send unauthorized API requests on the user's behalf. This can lead to unauthorized actions including uploading arbitrary files, which could be leveraged to introduce malicious content or manipulate application state. The absence of CSRF tokens or other anti-CSRF mechanisms on these endpoints is the root cause. Furthermore, this vulnerability can be chained with other weaknesses like stored cross-site scripting (XSS) to hijack user sessions or escalate privileges. The CVSS 3.0 score of 6.5 reflects that the attack vector is network-based, requires no privileges, but does require user interaction (visiting a malicious site). The impact is primarily on integrity, as attackers can modify or inject data via the API. No patches are currently linked, and no known exploits have been reported in the wild, indicating that organizations should proactively address this issue before exploitation occurs.

Potential Impact

For European organizations using ComfyUI, this vulnerability poses a significant risk to the integrity of their systems and data. Attackers can exploit CSRF to perform unauthorized actions such as uploading arbitrary files, potentially leading to malware introduction, data manipulation, or disruption of workflows. If combined with stored XSS vulnerabilities, attackers could escalate the attack to session hijacking or persistent compromise. This is particularly concerning for organizations relying on ComfyUI for sensitive or critical operations, as unauthorized API requests could undermine trust in the system and lead to data breaches or operational disruptions. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit. Given the collaborative and often web-accessible nature of UI tools like ComfyUI, the threat surface is broad, and the impact could extend to multiple departments or users within an organization.

Mitigation Recommendations

European organizations should immediately assess their use of ComfyUI and determine if they are running vulnerable versions (up to v0.2.2). Since no official patches are currently linked, organizations should implement the following mitigations: 1) Restrict access to the ComfyUI interface to trusted networks or VPNs to reduce exposure to malicious websites. 2) Employ web application firewalls (WAFs) to detect and block suspicious API requests that do not originate from legitimate user actions. 3) Educate users about the risks of visiting untrusted websites while authenticated to ComfyUI. 4) If possible, implement custom CSRF protections such as validating origin or referer headers on API endpoints. 5) Monitor logs for unusual API activity, especially on /upload/image, /prompt, and /history endpoints. 6) Consider isolating ComfyUI usage to dedicated environments with minimal sensitive data. 7) Stay updated with the vendor or community for forthcoming patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-10-28T18:54:29.234Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b22178f764e1f4709f2

Added to database: 10/15/2025, 1:01:22 PM

Last enriched: 10/15/2025, 1:14:19 PM

Last updated: 10/16/2025, 12:39:03 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats