CVE-2026-4964

A security vulnerability has been detected in letta-ai letta 0.16.4. This vulnerability affects the function _convert_message_create_to_message of the file letta/helpers/message_helper.py of the component File URL Handler. Such manipulation of the argument ImageContent leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://gist.github.com/YLChen-007/fde4d5ed6ac4aa876f73f8954c6214da Exploit Third Party Advisory
https://vuldb.com/?ctiid.353841 Permissions Required VDB Entry
https://vuldb.com/?id.353841 Third Party Advisory VDB Entry
https://vuldb.com/?submit.777645 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:letta:letta:0.16.4:*:*:*:*:*:*:*

History

29 Apr 2026, 22:04

Type Values Removed Values Added
CPE cpe:2.3:a:letta:letta:0.16.4:*:*:*:*:*:*:*
First Time Letta letta
Letta
References () https://gist.github.com/YLChen-007/fde4d5ed6ac4aa876f73f8954c6214da - () https://gist.github.com/YLChen-007/fde4d5ed6ac4aa876f73f8954c6214da - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.353841 - () https://vuldb.com/?ctiid.353841 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.353841 - () https://vuldb.com/?id.353841 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.777645 - () https://vuldb.com/?submit.777645 - Exploit, Third Party Advisory, VDB Entry

27 Mar 2026, 23:17

Type Values Removed Values Added
Summary (en) A security vulnerability has been detected in letta-ai letta 0.16.4. This vulnerability affects the function _convert_message_create_to_message of the file letta/helpers/message_helper.py of the component File URL Handler. Such manipulation of the argument ImageContent leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data. (en) A security vulnerability has been detected in letta-ai letta 0.16.4. This vulnerability affects the function _convert_message_create_to_message of the file letta/helpers/message_helper.py of the component File URL Handler. Such manipulation of the argument ImageContent leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

27 Mar 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 17:16

Updated : 2026-04-29 22:04


NVD link : CVE-2026-4964

Mitre link : CVE-2026-4964

CVE.ORG link : CVE-2026-4964


JSON object : View

Products Affected

letta

  • letta
CWE
CWE-918

Server-Side Request Forgery (SSRF)