CVE-2026-6606: SSRF in ModelScope AgentScope Audio Processing

CVE-2026-6606: SSRF in ModelScope AgentScope Audio Processing

The National Vulnerability Database has detailed CVE-2026-6606, a high-severity Server-Side Request Forgery (SSRF) vulnerability impacting ModelScope AgentScope up to version 1.0.18. Specifically, the flaw resides within the _process_audio_block function in src/agentscope/agent/_agent_base.py, where manipulating the url argument can trigger an SSRF.

This vulnerability is remotely exploitable, meaning attackers don’t need direct network access to the target system. An exploit has been publicly released, significantly raising the risk profile for affected installations. The National Vulnerability Database notes that the vendor did not respond to early disclosure attempts, which is concerning for timely patching.

SSRF vulnerabilities allow attackers to compel the server-side application to make requests to an arbitrary domain of the attacker’s choosing. This can lead to unauthorized access to internal systems, port scanning of internal networks, and potential data exfiltration, effectively turning a public-facing application into a pivot point for broader network compromise.

What This Means For You

  • If your organization utilizes ModelScope AgentScope, you must immediately verify your version. If it's 1.0.18 or earlier, assume you are vulnerable to CVE-2026-6606. Given the public exploit, this isn't a theoretical threat — it's an active risk. Prioritize patching or implementing network segmentation to restrict outbound connections from AgentScope instances to mitigate SSRF risks.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-6606: SSRF via ModelScope AgentScope Audio Processing URL Parameter

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6606 SSRF modelscope agentscope up to 1.0.18
CVE-2026-6606 SSRF src/agentscope/agent/_agent_base.py
CVE-2026-6606 SSRF function _process_audio_block
CVE-2026-6606 SSRF argument url manipulation
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 20, 2026 at 08:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6614 — TransformerOptimus SuperAGI Vulnerability

CVE-2026-6614 — A security flaw has been discovered in TransformerOptimus SuperAGI up to 0.0.14. Affected by this vulnerability is the function get_project/update_project/get_projects_organisation of the file...

vulnerabilityCVEmedium-severitycwe-285cwe-639
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 2 Sigma

CVE-2026-6613 — TransformerOptimus SuperAGI Vulnerability

CVE-2026-6613 — A vulnerability was identified in TransformerOptimus SuperAGI up to 0.0.14. Affected is the function delete_agent/stop_schedule/get_schedule_data of the file superagi/controllers/agent.py. The manipulation of the...

vulnerabilityCVEmedium-severitycwe-285cwe-639
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-6612 — A vulnerability was determined in TransformerOptimus

CVE-2026-6612 — A vulnerability was determined in TransformerOptimus SuperAGI up to 0.0.14. This impacts the function get_agent_execution/update_agent_execution of the file superagi/controllers/agent_execution.py of the component Agent...

vulnerabilityCVEmedium-severitycwe-285cwe-639
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 3 Sigma