Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LMDeploy Vulnerability Exploited Rapidly After Disclosure

LMDeploy Vulnerability Exploited Rapidly After Disclosure

Posted on April 24, 2026 By CWS

A significant security flaw in LMDeploy, a toolkit widely used for compressing and serving large language models, has been actively exploited in under 13 hours following its public announcement. Identified as CVE-2026-33626, this server-side request forgery (SSRF) vulnerability allows unauthorized access to sensitive data, posing a considerable threat to users.

Details of the LMDeploy Vulnerability

The critical flaw, which carries a CVSS score of 7.5, affects all versions of LMDeploy up to 0.12.0 that support vision-language features. According to the developers’ advisory, the issue arises from the load_image() function in lmdeploy/vl/utils.py, which fetches URLs without sufficiently validating internal or private IP addresses. This oversight could enable attackers to access cloud metadata services and internal networks.

Igor Stepansky, a researcher from Orca Security, discovered this vulnerability and reported it, highlighting its potential to steal cloud credentials, access internal services, and facilitate lateral movement within networks.

Initial Exploitation and Analysis

Cloud security firm Sysdig observed the first exploitation attempt against its honeypot systems just 12 hours and 31 minutes after the vulnerability was disclosed on GitHub. The attack originated from IP address 103.116.72[.]119 and involved using the image loader to perform a port scan on the internal network, targeting various services including AWS Instance Metadata Service (IMDS), Redis, and MySQL.

The attack unfolded in three phases over a brief eight-minute period, with the adversary making 10 distinct requests. The strategic use of different vision language models likely aimed to avoid detection.

Broader Implications and Related Threats

This incident underscores the rapid pace at which threat actors can exploit new vulnerabilities, often before users can implement necessary patches. Sysdig noted this trend is particularly prevalent in AI infrastructure, where urgent advisories are quickly weaponized.

In parallel, vulnerabilities in WordPress plugins, such as Ninja Forms and Breeze Cache, are also being targeted. These flaws allow for arbitrary file uploads and potential site takeovers. Additionally, a global campaign has been identified that exploits Modbus-enabled programmable logic controllers, affecting numerous countries with notable activity traced back to China.

Overall, the swift exploitation of CVE-2026-33626 highlights the need for immediate action upon vulnerability disclosures and reinforces the importance of continuous monitoring and patch management in cybersecurity practices.

The Hacker News Tags:AI infrastructure, cloud security, CVE-2026-33626, Cybersecurity, LMDeploy, security flaw, SSRF, Sysdig, vulnerability exploitation, WordPress vulnerabilities

Post navigation

Previous Post: Copperhelm Secures $7M for Innovative Cloud Security
Next Post: Bitwarden NPM Package Compromised in Major Supply Chain Breach

Related Posts

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover The Hacker News
CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat The Hacker News
New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails The Hacker News
U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN The Hacker News
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations The Hacker News
Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in Xiongmai IP Cameras Exposed
  • US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls
  • Safeguarding AI Agents Through Effective Delegation
  • Tropic Trooper Utilizes Trojanized Software for Cyber Attacks
  • Trigona Ransomware Group Crafts Custom Data Theft Tool

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in Xiongmai IP Cameras Exposed
  • US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls
  • Safeguarding AI Agents Through Effective Delegation
  • Tropic Trooper Utilizes Trojanized Software for Cyber Attacks
  • Trigona Ransomware Group Crafts Custom Data Theft Tool

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark