Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LMDeploy Vulnerability Exploited Rapidly After Disclosure

LMDeploy Vulnerability Exploited Rapidly After Disclosure

Posted on April 24, 2026 By CWS

A significant security flaw in LMDeploy, a toolkit widely used for compressing and serving large language models, has been actively exploited in under 13 hours following its public announcement. Identified as CVE-2026-33626, this server-side request forgery (SSRF) vulnerability allows unauthorized access to sensitive data, posing a considerable threat to users.

Details of the LMDeploy Vulnerability

The critical flaw, which carries a CVSS score of 7.5, affects all versions of LMDeploy up to 0.12.0 that support vision-language features. According to the developers’ advisory, the issue arises from the load_image() function in lmdeploy/vl/utils.py, which fetches URLs without sufficiently validating internal or private IP addresses. This oversight could enable attackers to access cloud metadata services and internal networks.

Igor Stepansky, a researcher from Orca Security, discovered this vulnerability and reported it, highlighting its potential to steal cloud credentials, access internal services, and facilitate lateral movement within networks.

Initial Exploitation and Analysis

Cloud security firm Sysdig observed the first exploitation attempt against its honeypot systems just 12 hours and 31 minutes after the vulnerability was disclosed on GitHub. The attack originated from IP address 103.116.72[.]119 and involved using the image loader to perform a port scan on the internal network, targeting various services including AWS Instance Metadata Service (IMDS), Redis, and MySQL.

The attack unfolded in three phases over a brief eight-minute period, with the adversary making 10 distinct requests. The strategic use of different vision language models likely aimed to avoid detection.

Broader Implications and Related Threats

This incident underscores the rapid pace at which threat actors can exploit new vulnerabilities, often before users can implement necessary patches. Sysdig noted this trend is particularly prevalent in AI infrastructure, where urgent advisories are quickly weaponized.

In parallel, vulnerabilities in WordPress plugins, such as Ninja Forms and Breeze Cache, are also being targeted. These flaws allow for arbitrary file uploads and potential site takeovers. Additionally, a global campaign has been identified that exploits Modbus-enabled programmable logic controllers, affecting numerous countries with notable activity traced back to China.

Overall, the swift exploitation of CVE-2026-33626 highlights the need for immediate action upon vulnerability disclosures and reinforces the importance of continuous monitoring and patch management in cybersecurity practices.

The Hacker News Tags:AI infrastructure, cloud security, CVE-2026-33626, Cybersecurity, LMDeploy, security flaw, SSRF, Sysdig, vulnerability exploitation, WordPress vulnerabilities

Post navigation

Previous Post: Copperhelm Secures $7M for Innovative Cloud Security
Next Post: Bitwarden NPM Package Compromised in Major Supply Chain Breach

Related Posts

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others The Hacker News
CanisterWorm Exploits Trivy Attack, Targets npm Packages CanisterWorm Exploits Trivy Attack, Targets npm Packages The Hacker News
Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model The Hacker News
Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems The Hacker News
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub The Hacker News
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Tropic Trooper Utilizes Trojanized Software for Cyber Attacks
  • Trigona Ransomware Group Crafts Custom Data Theft Tool
  • Critical Flaws Addressed in CrowdStrike and Tenable Software
  • Hackers Exploit React2Shell with Telegram Bots
  • Bitwarden NPM Package Compromised in Major Supply Chain Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Tropic Trooper Utilizes Trojanized Software for Cyber Attacks
  • Trigona Ransomware Group Crafts Custom Data Theft Tool
  • Critical Flaws Addressed in CrowdStrike and Tenable Software
  • Hackers Exploit React2Shell with Telegram Bots
  • Bitwarden NPM Package Compromised in Major Supply Chain Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark