CVE-2026-22664

prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token parameter. Attackers can exploit the lack of URL validation to disclose the FAL_API_KEY in the Authorization header, enabling credential theft, internal network probing, and abuse of the victim's Fal.ai account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fka:prompts.chat:*:*:*:*:*:*:*:*

History

13 Apr 2026, 18:13

Type Values Removed Values Added
CPE cpe:2.3:a:fka:prompts.chat:*:*:*:*:*:*:*:*
First Time Fka
Fka prompts.chat
References () https://gist.github.com/mdisec/27c0cac0ec6a8f3c8f85a18987ddb942 - () https://gist.github.com/mdisec/27c0cac0ec6a8f3c8f85a18987ddb942 - Exploit, Third Party Advisory
References () https://github.com/f/prompts.chat/commit/30a8f0470e0ba45e6be9c9f55220f4a9a6b91c99 - () https://github.com/f/prompts.chat/commit/30a8f0470e0ba45e6be9c9f55220f4a9a6b91c99 - Patch
References () https://www.vulncheck.com/advisories/prompts-chat-ssrf-via-fal-ai-media-status-polling - () https://www.vulncheck.com/advisories/prompts-chat-ssrf-via-fal-ai-media-status-polling - Third Party Advisory

07 Apr 2026, 15:17

Type Values Removed Values Added
References () https://gist.github.com/mdisec/27c0cac0ec6a8f3c8f85a18987ddb942 - () https://gist.github.com/mdisec/27c0cac0ec6a8f3c8f85a18987ddb942 -

03 Apr 2026, 21:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-03 21:17

Updated : 2026-04-13 18:13


NVD link : CVE-2026-22664

Mitre link : CVE-2026-22664

CVE.ORG link : CVE-2026-22664


JSON object : View

Products Affected

fka

  • prompts.chat
CWE
CWE-918

Server-Side Request Forgery (SSRF)