Vulnerability Description
LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Internlm | Lmdeploy | < 0.12.3 |
Related Weaknesses (CWE)
References
- https://github.com/InternLM/lmdeploy/commit/71d64a339edb901e9005358e0633fbbab367Patch
- https://github.com/InternLM/lmdeploy/pull/4447Issue TrackingPatch
- https://github.com/InternLM/lmdeploy/releases/tag/v0.12.3Release Notes
- https://github.com/InternLM/lmdeploy/security/advisories/GHSA-6w67-hwm5-92mqExploitMitigationVendor Advisory
- https://github.com/InternLM/lmdeploy/security/advisories/GHSA-6w67-hwm5-92mqExploitMitigationVendor Advisory
FAQ
What is CVE-2026-33626?
CVE-2026-33626 is a vulnerability with a CVSS score of 7.5 (HIGH). LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language modu...
How severe is CVE-2026-33626?
CVE-2026-33626 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33626?
Check the references section above for vendor advisories and patch information. Affected products include: Internlm Lmdeploy.