Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3788: Server-Side Request Forgery in Bytedesk

0
Medium
VulnerabilityCVE-2026-3788cvecve-2026-3788
Published: Sun Mar 08 2026 (03/08/2026, 23:32:08 UTC)
Source: CVE Database V5
Product: Bytedesk

Description

A security vulnerability has been detected in Bytedesk up to 1.3.9. This impacts the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/openrouter/SpringAIOpenrouterRestService.java of the component SpringAIOpenrouterRestController. Such manipulation of the argument apiUrl leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.4.5.4 will fix this issue. The name of the patch is 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:25:42 UTC

Technical Analysis

CVE-2026-3788 is a server-side request forgery (SSRF) vulnerability identified in Bytedesk software versions 1.3.0 through 1.3.9. The vulnerability exists in the getModels method within the SpringAIOpenrouterRestService.java source file, part of the SpringAIOpenrouterRestController component. The root cause is insufficient validation or sanitization of the apiUrl parameter, which an attacker can manipulate to coerce the server into making arbitrary HTTP requests. This can allow attackers to access internal resources, bypass firewall restrictions, or retrieve sensitive information from internal networks that are otherwise inaccessible externally. The vulnerability can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability at a low level (VC:L, VI:L, VA:L). The vulnerability was publicly disclosed on March 8, 2026, and a patch is available in version 1.4.5.4, identified by patch commit 975e39e4dd527596987559f56c5f9f973f64eff7. While no active exploitation has been reported, the public disclosure increases the risk of future attacks. The vulnerability highlights the importance of proper input validation in server-side components that handle external URLs or API endpoints.

Potential Impact

The SSRF vulnerability in Bytedesk could allow attackers to make unauthorized requests from the vulnerable server to internal or external systems. This can lead to several impacts: unauthorized access to internal network services that are not exposed externally, potentially exposing sensitive data or internal APIs; information disclosure if the attacker can retrieve internal metadata or configuration details; potential pivoting to other internal systems leading to broader network compromise; disruption of service if the attacker causes the server to make malicious or resource-intensive requests; and undermining trust in the affected application. Organizations relying on Bytedesk for AI or chat services may face data confidentiality risks and operational disruptions. The medium CVSS score reflects that while the vulnerability is exploitable remotely without authentication, the impact on confidentiality, integrity, and availability is limited to low levels individually. However, combined with other vulnerabilities or misconfigurations, the risk could escalate. Industries with sensitive internal networks or regulatory requirements for data protection are particularly at risk.

Mitigation Recommendations

To mitigate CVE-2026-3788, organizations should immediately upgrade Bytedesk to version 1.4.5.4 or later, which contains the official patch addressing the SSRF vulnerability. Beyond patching, implement strict input validation and sanitization on any parameters that accept URLs or external resource identifiers to prevent manipulation. Employ network segmentation and firewall rules to restrict the server's ability to make arbitrary outbound requests, limiting access to only trusted endpoints. Monitor and log outbound requests from the Bytedesk server to detect unusual or unauthorized access attempts. Use web application firewalls (WAFs) with SSRF detection capabilities to block suspicious payloads. Conduct regular security assessments and code reviews focusing on external input handling. If upgrading is temporarily not possible, consider disabling or restricting the vulnerable component or function. Educate developers and administrators about SSRF risks and secure coding practices to prevent similar issues in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-08T07:20:23.877Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae0bcb2904315ca302ed58

Added to database: 3/8/2026, 11:52:43 PM

Last enriched: 3/16/2026, 9:25:42 AM

Last updated: 4/28/2026, 3:31:32 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses