← Back to feed

CVE-2026-33626: LMDeploy SSRF Exploited Within 12 Hours of Disclosure for Cloud Metadata Access

Date: 2026-04-24
Tags: supply-chain, malicious-tool

Executive Summary

On April 21, 2026, GitHub published GHSA-6w67-hwm5-92mq, later assigned CVE-2026-33626, a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy. Within 12 hours and 31 minutes of its publication on the main GitHub advisory page, the Sysdig Threat Research Team (TRT) observed the first LMDeploy exploitation attempt against our honeypot fleet. The attacker used the vision-language image loader as a generic HTTP SSRF primitive to port-scan the internal network behind the model server: AWS Instance Metadata Service (IMDS), Redis, MySQL, a secondary HTTP administrative interface, and an out-of-band (OOB) DNS exfiltration endpoint.

Campaign Summary

FieldDetail
Campaign / MalwareLMDeploy SSRF Reconnaissance Campaign
AttributionUnknown; opportunistic exploitation (confidence: low)
TargetLMDeploy inference servers with cloud hosting and internal network access
VectorVision-language LLM SSRF via malicious image URL
Statusactive
First Observed2026-04-21

Detailed Findings

LMDeploy is a toolkit for serving vision-language and text large language models (LLMs) developed by Shanghai AI Laboratory, InternLM. CVE-2026-33626 fits a pattern that has been observed repeatedly in the AI-infrastructure space over the past six months: critical vulnerabilities in inference servers, model gateways, and agent orchestration tools are being weaponized within hours of advisory publication, regardless of the size or extent of their install base. An advisory as specific as GHSA-6w67-hwm5-92mq, which includes the affected file, parameter name, root-cause explanation, and sample vulnerable code, is effectively an input prompt for any commercial LLM to generate a potential exploit. Any advisory that names the vulnerable function, shows the missing check, or quotes the affected code pattern, in the age of capable code-generation models, becomes a turnkey exploit. What distinguishes CVE-2026-33626 from a textbook SSRF is what the primitive unlocks on an AI-serving node: IAM credentials and cloud metadata. CVE-2026-33626 in LMDeploy was exploited within 12 hours of disclosure, enabling attackers to use a vision-LLM endpoint for SSRF-based internal network scanning, cloud metadata access, and service enumeration.

MITRE ATT&CK Mapping

TechniqueIDContext
Server-Side Request Forgery (SSRF)T1190SSRF vulnerability in vision-language image loader enabling internal network access
ReconnaissanceT1592Attacker port-scanned AWS IMDS, Redis, MySQL to enumerate internal infrastructure

IOCs

Domains

_CVE-2026-33626 affects LMDeploy toolkit; affected versions not explicitly specified in available advisory text; GitHub advisory GHSA-6w67-hwm5-92mq is primary reference_

Full URL Paths

_CVE-2026-33626 affects LMDeploy toolkit; affected versions not explicitly specified in available advisory text; GitHub advisory GHSA-6w67-hwm5-92mq is primary reference_

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

lmdeploy

Detection Recommendations

Monitor for unexpected outbound HTTP requests from LMDeploy processes, especially to 169.254.169.254 (AWS IMDS), localhost on non-standard ports (6379 for Redis, 3306 for MySQL), or external DNS exfiltration endpoints. Log all image loading requests and validate URL safety against a whitelist. Implement least-privilege IAM roles for LMDeploy service accounts to limit IMDS credential exposure. Apply network segmentation to restrict LMDeploy access to internal resources.

References