LMDeploy Vulnerability Exposes LLM Servers to SSRF Attacks
The National Vulnerability Database has identified a critical Server-Side Request Forgery (SSRF) vulnerability in LMDeploy, a popular toolkit for large language model (LLM) deployment. Affecting versions prior to 0.12.3, the flaw resides within the vision-language module. Specifically, the load_image() function fails to validate arbitrary URLs, allowing unauthenticated attackers to fetch content from internal networks and cloud metadata services.
This SSRF vulnerability, rated HIGH with a CVSS score of 7.5, presents a significant risk. Attackers can exploit this weakness to pivot within an organization’s infrastructure, access sensitive cloud credentials, or exfiltrate internal data by tricking the LMDeploy server into making requests to attacker-controlled or sensitive internal endpoints.
Organizations utilizing LMDeploy must immediately upgrade to version 0.12.3 or later. Defenders should also consider implementing network segmentation and egress filtering to limit the potential blast radius of any successful SSRF exploitation, even on patched systems.
What This Means For You
- If your organization deploys large language models using LMDeploy, check your current version immediately. If you are running a version prior to 0.12.3, patch to the latest release to prevent attackers from accessing internal cloud metadata services or sensitive network resources.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-33626 - LMDeploy SSRF to Cloud Metadata Service
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-33626 | Vulnerability | CVE-2026-33626 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 21, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.