Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-395j-2jwf-q33h

Опубликовано: 02 апр. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 5.5
CVSS3: 7.3

Описание

A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 11%
0.00038
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 7.3
nvd
5 дней назад

A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 11%
0.00038
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-918