Submit #768043: Bytedesk <=1.3.9 SSRFinfo

TitleBytedesk <=1.3.9 SSRF
DescriptionThe endpoint GET /openrouter/api/v1/models accepts a user-supplied apiUrl parameter and passes it directly to a RestTemplate.exchange() call without validation or allowlist enforcement. An attacker supplies an attacker-controlled URL, causing the server to issue an outbound HTTP request to an arbitrary host. DNS callback logs confirm the SSRF, enabling internal network scanning, cloud metadata access, or credential theft.
Source⚠️ https://github.com/Bytedesk/bytedesk/issues/20
User
 ZAST.AI (UID 87884)
Submission02/26/2026 07:19 (1 month ago)
Moderation03/08/2026 08:20 (10 days later)
StatusAccepted
VulDB entry349755 [Bytedesk up to 1.3.9 SpringAIOpenrouterRestController SpringAIOpenrouterRestService.java getModels apiUrl server-side request forgery]
Points19

Want to know what is going to be exploited?

We predict KEV entries!