Submit #752774: Hugging Face smolagents 1.24.0 Server-Side Request Forgeryinfo

TitleHugging Face smolagents 1.24.0 Server-Side Request Forgery
DescriptionThe smolagents library's LocalPythonExecutor component fails to implement network egress filtering. When a user configures the executor with authorized network-capable modules (e.g., requests), the sandbox environment does not prevent the Agent from accessing sensitive internal infrastructure or cloud metadata services (e.g., x.x.x.x). This leads to Server-Side Request Forgery (SSRF) and potential data exfiltration via Out-of-Band (OOB) techniques. Furthermore, the provided Starlette/Gradio server examples lack default authentication, exacerbating the risk of remote exploitation.
Source⚠️ https://github.com/CH0ico/CVE_choco_smolagent/tree/main
User
 Choco094late (UID 75875)
Submission02/05/2026 10:46 (3 months ago)
Moderation02/18/2026 07:39 (13 days later)
StatusAccepted
VulDB entry346451 [huggingface smolagents 1.24.0 LocalPythonExecutor requests.get/requests.post server-side request forgery]
Points20

Interested in the pricing of exploits?

See the underground prices here!