Vulnerability Description
Local Deep Research is an AI-powered research assistant for deep, iterative research. In versions from 1.3.0 to before 1.3.9, the download service (download_service.py) makes HTTP requests using raw requests.get() without utilizing the application's SSRF protection (safe_requests.py). This can allow attackers to access internal services and attempt to reach cloud provider metadata endpoints (AWS/GCP/Azure), as well as perform internal network reconnaissance, by submitting malicious URLs through the API, depending on the deployment and surrounding controls. This issue has been patched in version 1.3.9.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Learningcircuit | Local Deep Research | >= 1.3.0, < 1.3.9 |
Related Weaknesses (CWE)
References
- https://github.com/LearningCircuit/local-deep-research/commit/b79089ff30c5d9ae77Patch
- https://github.com/LearningCircuit/local-deep-research/security/advisories/GHSA-ExploitVendor Advisory
- https://github.com/LearningCircuit/local-deep-research/security/advisories/GHSA-ExploitVendor Advisory
FAQ
What is CVE-2025-67743?
CVE-2025-67743 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Local Deep Research is an AI-powered research assistant for deep, iterative research. In versions from 1.3.0 to before 1.3.9, the download service (download_service.py) makes HTTP requests using raw r...
How severe is CVE-2025-67743?
CVE-2025-67743 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-67743?
Check the references section above for vendor advisories and patch information. Affected products include: Learningcircuit Local Deep Research.