A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch and process media from user-provided URLs without adequate restrictions on the target hosts. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Oct 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch and process media from user-provided URLs without adequate restrictions on the target hosts. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources. | |
Title | Vllm: server side request forgery (ssrf) in mediaconnector | |
First Time appeared |
Redhat
Redhat ai Inference Server Redhat enterprise Linux Ai |
|
Weaknesses | CWE-918 | |
CPEs | cpe:/a:redhat:ai_inference_server:3 cpe:/a:redhat:enterprise_linux_ai:1 |
|
Vendors & Products |
Redhat
Redhat ai Inference Server Redhat enterprise Linux Ai |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-07T19:57:03.472Z
Reserved: 2025-06-18T15:26:11.100Z
Link: CVE-2025-6242

Updated: 2025-10-07T19:55:32.062Z

Status : Received
Published: 2025-10-07T20:15:36.187
Modified: 2025-10-07T20:15:36.187
Link: CVE-2025-6242

No data.

No data.