CVE-2026-33626
LMDeploy Vulnerable to Server-Side Request Forgery (SSRF) via Vision-Language Image Loading
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.
| CWE | CWE-918 |
| Vendor | internlm |
| Product | lmdeploy |
| Published | Apr 20, 2026 |
Stay Ahead of the Next One
Get instant alerts for internlm lmdeploy
Be the first to know when new high vulnerabilities affecting internlm lmdeploy are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
InternLM / lmdeploy
< 0.12.3
References
github.com: https://github.com/InternLM/lmdeploy/security/advisories/GHSA-6w67-hwm5-92mq github.com: https://github.com/InternLM/lmdeploy/pull/4447 github.com: https://github.com/InternLM/lmdeploy/commit/71d64a339edb901e9005358e0633fbbab367d626 github.com: https://github.com/InternLM/lmdeploy/releases/tag/v0.12.3