LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

Published: (April 24, 2026 at 03:24 AM EDT)
1 min read

Source: The Hacker News

Summary

A high‑severity security flaw in LMDeploy, an open‑source toolkit for compressing, deploying, and serving large language models (LLMs), has been actively exploited in the wild less than 13 hours after its public disclosure.

Vulnerability Details

  • CVE Identifier: CVE‑2026‑33626
  • CVSS Score: 7.5 (High)
  • Type: Server‑Side Request Forgery (SSRF)
  • Impact: Allows an attacker to force the vulnerable server to make arbitrary HTTP requests, potentially exposing sensitive data or internal services.

Timeline

  • Disclosure: Publicly disclosed on [date of disclosure].
  • Exploitation: Reports of active exploitation surfaced within 13 hours of disclosure.

Mitigation

  • Update: Apply the latest LMDeploy release that addresses CVE‑2026‑33626.
  • Network Controls: Restrict outbound traffic from LMDeploy instances to only trusted endpoints.
  • Input Validation: Ensure any user‑controlled URLs are validated and sanitized before being processed.

References

If you are using LMDeploy, verify that your deployment is running a patched version and review your network egress rules to mitigate potential SSRF attacks.

0 views
Back to Blog

Related posts

Read more »