Untriaged
Permalink
CVE-2026-2654
6.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
huggingface smolagents LocalPythonExecutor requests.post server-side request forgery
A weakness has been identified in huggingface smolagents 1.24.0. Impacted is the function requests.get/requests.post of the component LocalPythonExecutor. Executing a manipulation can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
- VDB-346451 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #752774 | Hugging Face smolagents 1.24.0 Server-Side Request Forgery third-party-advisory
- https://github.com/CH0ico/CVE_choco_smolagent/tree/main related
- https://github.com/CH0ico/CVE_choco_smolagent/blob/main/report.md#proof-of-conc… exploit
- VDB-346451 | huggingface smolagents LocalPythonExecutor requests.post server-side request forgery vdb-entry technical-description
Affected products
smolagents
- ==1.24.0
Matching in nixpkgs
pkgs.python312Packages.smolagents
Barebones library for agents
pkgs.python313Packages.smolagents
Barebones library for agents
pkgs.python314Packages.smolagents
Barebones library for agents
Package maintainers
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>