CVE-2026-3789

A vulnerability was detected in Bytedesk up to 1.3.9. Affected is the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/gitee/SpringAIGiteeRestService.java of the component SpringAIGiteeRestController. Performing a manipulation of the argument apiUrl results in server-side request forgery. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 1.4.5.4 is able to address this issue. The patch is named 975e39e4dd527596987559f56c5f9f973f64eff7. Upgrading the affected component is advised.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bytedesk:bytedesk:*:*:*:*:*:*:*:*

History

10 Mar 2026, 18:50

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue detectada en Bytedesk hasta 1.3.9. Afectada es la función getModels del archivo source-code/src/main/java/com/bytedesk/ai/springai/providers/gitee/SpringAIGiteeRestService.java del componente SpringAIGiteeRestController. Realizar una manipulación del argumento apiUrl resulta en falsificación de petición del lado del servidor. Explotación remota del ataque es posible. El exploit es ahora público y puede ser usado. Actualizar a la versión 1.4.5.4 puede solucionar este problema. El parche se llama 975e39e4dd527596987559f56c5f9f973f64eff7. Se aconseja actualizar el componente afectado.
CPE cpe:2.3:a:bytedesk:bytedesk:*:*:*:*:*:*:*:*
First Time Bytedesk
Bytedesk bytedesk
References () https://github.com/Bytedesk/bytedesk/ - () https://github.com/Bytedesk/bytedesk/ - Product
References () https://github.com/Bytedesk/bytedesk/commit/975e39e4dd527596987559f56c5f9f973f64eff7 - () https://github.com/Bytedesk/bytedesk/commit/975e39e4dd527596987559f56c5f9f973f64eff7 - Patch
References () https://github.com/Bytedesk/bytedesk/issues/21 - () https://github.com/Bytedesk/bytedesk/issues/21 - Exploit, Vendor Advisory
References () https://github.com/Bytedesk/bytedesk/issues/21#issue-3993531226 - () https://github.com/Bytedesk/bytedesk/issues/21#issue-3993531226 - Exploit, Vendor Advisory
References () https://github.com/Bytedesk/bytedesk/issues/21#issuecomment-3976672522 - () https://github.com/Bytedesk/bytedesk/issues/21#issuecomment-3976672522 - Exploit, Vendor Advisory
References () https://github.com/Bytedesk/bytedesk/releases/tag/v1.4.5.4 - () https://github.com/Bytedesk/bytedesk/releases/tag/v1.4.5.4 - Release Notes
References () https://vuldb.com/?ctiid.349756 - () https://vuldb.com/?ctiid.349756 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349756 - () https://vuldb.com/?id.349756 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.768044 - () https://vuldb.com/?submit.768044 - Third Party Advisory, VDB Entry

09 Mar 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-09 00:16

Updated : 2026-03-10 18:50


NVD link : CVE-2026-3789

Mitre link : CVE-2026-3789

CVE.ORG link : CVE-2026-3789


JSON object : View

Products Affected

bytedesk

  • bytedesk
CWE
CWE-918

Server-Side Request Forgery (SSRF)