← Back to feed

CVE-2026-33626: LMDeploy SSRF Exploited Within 12 Hours of Disclosure for Cloud Metadata Access

Date: 2026-04-23
Tags: malicious-tool, supply-chain

Executive Summary

On April 21, 2026, GitHub published GHSA-6w67-hwm5-92mq, later assigned CVE-2026-33626, a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy. LMDeploy is a toolkit for serving vision-language and text large language models (LLMs). CVE-2026-33626 in LMDeploy was exploited within 12 hours of disclosure, enabling attackers to use a vision-LLM endpoint for SSRF-based internal network scanning, cloud metadata access, and service enumeration.

Campaign Summary

FieldDetail
Campaign / MalwareLMDeploy SSRF Weaponization Campaign (CVE-2026-33626)
AttributionUnknown; exploitation activity observed within hours (confidence: low)
TargetOrganizations running LMDeploy inference servers on internet-accessible infrastructure; cloud environments with LMDeploy deployments
VectorSSRF-based internal network scanning, cloud metadata access, and service enumeration. Three localhost probes in 36 seconds is the signature of a scripted port sweep using the SSRF as a probe primitive. The attacker is not looking for image files; they are instead treating the vision-LLM endpoint as a generic HTTP GET that can reach addresses the external network cannot.
Statusactive
First Observed2026-04-21

Detailed Findings

Every one of these URLs is blocked by the v0.12.3 _is_safe_url() check. CVE-2026-33626 fits a pattern that we have observed repeatedly in the AI-infrastructure space over the past six months: critical vulnerabilities in inference servers, model gateways, and agent orchestration tools are being weaponized within hours of advisory publication, regardless of the size or extent of their install base. LMDeploy, for instance, has 7,798 GitHub stars, an order of magnitude less than mainstream projects like vLLM or Ollama, and it does not appear in CISA's Known Exploited Vulnerabilities (KEV) catalog. An advisory as specific as GHSA-6w67-hwm5-92mq, which includes the affected file, parameter name, root-cause explanation, and sample vulnerable code, is effectively an input prompt for any commercial LLM to generate a potential exploit. We have recently observed and reported on this pattern across multiple recent niche-target exploitations: GHSA publishes, working exploit appears within hours, no public PoC existed. Any advisory that names the vulnerable function, shows the missing check, or quotes the affected code pattern, in the age of capable code-generation models, becomes a turnkey exploit. What distinguishes CVE-2026-33626 from a textbook SSRF is what the primitive unlocks on an AI-serving node: IAM credentials and cloud metadata. Twelve hours and 31 minutes from publication to the first observed exploitation of LMDeploy is short enough that "patch Tuesday" cadences and monthly scans are not a sufficient control. The attacker did not merely validate the bug, but they used it as a port-scanning primitive in a single eight-minute session.

MITRE ATT&CK Mapping

TechniqueIDContext
Server-Side Request Forgery (SSRF)T1190Vision-LLM endpoint exploited to perform requests to internal addresses
Cloud Metadata AccessT1526SSRF used to enumerate cloud metadata endpoints (IAM credentials, service tokens)
Active Scanning: Vulnerability ScanningT1595.002Port sweeping and service enumeration via SSRF

IOCs

Domains

_No specific IOCs published; exploitation focused on localhost enumeration and cloud metadata access patterns_

Full URL Paths

_No specific IOCs published; exploitation focused on localhost enumeration and cloud metadata access patterns_

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

lmdeploy@<0.12.3

Detection Recommendations

For defenders running AI infrastructure, vision-LLM image loaders, agent tool-use endpoints, and RAG fetchers are all SSRF candidates by default unless explicit egress filtering is applied. Implement strict URL allowlisting for all image retrieval endpoints; monitor for HTTP requests to localhost or private IP ranges (169.254.x.x, 10.x.x.x, 172.16-31.x.x, 192.168.x.x) from LMDeploy processes; audit LMDeploy logs for _is_safe_url() bypass attempts or failed URL validations; implement network segmentation to restrict egress from inference servers; deploy WAF rules to block common SSRF payloads in image URLs. Urgent patching to LMDeploy v0.12.3 or later is critical given the 12-hour exploitation window.

References