Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5346: Server-Side Request Forgery in huimeicloud hm_editor

0
Medium
VulnerabilityCVE-2026-5346cvecve-2026-5346
Published: Thu Apr 02 2026 (04/02/2026, 15:00:16 UTC)
Source: CVE Database V5
Vendor/Project: huimeicloud
Product: hm_editor

Description

A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 15:25:07 UTC

Technical Analysis

CVE-2026-5346 identifies a server-side request forgery vulnerability in the huimeicloud hm_editor product, specifically in versions 2.2.0 through 2.2.3. The vulnerability resides in the client.get function of the src/mcp-server.js file, which handles the image-to-base64 conversion endpoint. By manipulating the URL parameter passed to this function, an attacker can coerce the server into sending arbitrary HTTP requests to internal or external systems. SSRF vulnerabilities typically allow attackers to bypass network access controls, potentially accessing internal services that are not directly exposed to the internet. In this case, the vulnerability requires no authentication or user interaction, making it remotely exploitable by any attacker aware of the endpoint. The vendor was notified early but has not responded or issued a patch, increasing the risk for users of this software. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and low impacts on confidentiality, integrity, and availability (VC:L/VI:L/VA:L). While no known exploits have been observed in the wild, the public disclosure of the vulnerability and lack of vendor mitigation elevate the threat level. This vulnerability could be leveraged for internal network reconnaissance, accessing metadata services, or pivoting to other internal resources, depending on the server environment and network segmentation.

Potential Impact

The SSRF vulnerability in hm_editor can have significant impacts on organizations using affected versions. Attackers can exploit this flaw to make the vulnerable server send arbitrary HTTP requests, potentially accessing internal services that are otherwise protected by firewalls or network segmentation. This can lead to unauthorized information disclosure, such as internal IP addresses, sensitive metadata endpoints (e.g., cloud provider metadata services), or internal APIs. Additionally, SSRF can be a stepping stone for further attacks, including lateral movement, data exfiltration, or triggering other vulnerabilities in internal systems. Although the CVSS score is medium, the ease of exploitation without authentication and user interaction increases risk, especially in environments where hm_editor is exposed to the internet. The lack of vendor response and patches means organizations must rely on alternative mitigations. The impact on confidentiality, integrity, and availability is limited but non-negligible, as SSRF can be chained with other vulnerabilities for more severe consequences.

Mitigation Recommendations

Since no official patches or vendor responses are available, organizations should implement several practical mitigations to reduce risk. First, restrict network access from the hm_editor server to only necessary external and internal resources using firewall rules or network segmentation to limit SSRF exploitation scope. Second, implement input validation and sanitization on the URL parameter in the image-to-base64 endpoint to block suspicious or internal IP ranges, localhost addresses, and non-HTTP/HTTPS protocols. Third, deploy web application firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting this endpoint. Fourth, monitor server logs and network traffic for unusual outbound requests originating from the hm_editor server. Fifth, consider isolating or containerizing the hm_editor application to limit potential lateral movement. Finally, plan for upgrading or replacing the affected software once a vendor patch or alternative solution becomes available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-04-01T16:04:54.992Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ce8676e6bfc5ba1de33855

Added to database: 4/2/2026, 3:08:38 PM

Last enriched: 4/2/2026, 3:25:07 PM

Last updated: 4/3/2026, 6:00:20 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses