GPT Researcher Server-Side Request Forgery Vulnerability (CVE-2026-5633)
A server-side request forgery (SSRF) vulnerability exists in assafelovic gpt-researcher up to version 3.4.3, affecting the ws Endpoint component, allowing a remote attacker to manipulate the source_urls argument and potentially access internal resources or conduct further attacks.
A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-5633, affects assafelovic’s gpt-researcher version 3.4.3 and earlier. The vulnerability resides within the ws Endpoint component and is triggered by manipulating the source_urls argument. This flaw allows a remote attacker to potentially force the application to make requests to arbitrary internal or external resources. A publicly disclosed exploit exists, increasing the risk of exploitation. The developers were notified through an issue report, but have not yet responded. This vulnerability is a significant concern for organizations using gpt-researcher, as it can lead to sensitive data exposure or further attacks originating from the application’s server.
Attack Chain
- Attacker identifies a gpt-researcher instance running version 3.4.3 or earlier.
- Attacker crafts a malicious request containing a manipulated
source_urlsargument. This URL points to an internal resource or an external server controlled by the attacker. - The gpt-researcher application, specifically the ws Endpoint component, processes the request without proper validation of the
source_urlsparameter. - The application initiates a request to the attacker-specified URL, effectively acting as a proxy.
- If the URL points to an internal resource, the attacker gains access to potentially sensitive data or internal services not intended for public access.
- If the URL points to an external server controlled by the attacker, the server receives the request, revealing information about the gpt-researcher instance, such as its IP address.
- The attacker can then leverage this information to further compromise the server or the network it resides on, potentially leading to lateral movement or data exfiltration.
Impact
Successful exploitation of CVE-2026-5633 can allow an attacker to perform actions they are not authorized to do. This includes reading internal data, accessing internal services, or using the vulnerable server as a proxy for further attacks. While the exact number of victims is unknown, any organization using a vulnerable version of gpt-researcher is at risk. The consequences of a successful SSRF attack can range from information disclosure to full server compromise, depending on the internal resources accessible to the application.
Recommendation
- Inspect web server access logs for requests containing suspicious URLs in the
source_urlsparameter that point to internal or unexpected external resources. This can aid in detecting ongoing exploitation attempts (logsource: webserver, product: linux/windows). - Apply input validation to the
source_urlsparameter to ensure that the application only makes requests to authorized and expected resources. - Monitor network connections originating from the gpt-researcher server for unusual outbound traffic to internal or external IP addresses (logsource: network_connection, product: windows/linux).
- Deploy the provided Sigma rule to detect potential SSRF attempts by monitoring for suspicious URL patterns in web server logs.
Detection coverage 2
Detect GPT Researcher SSRF Attempt via URL Parameter
highDetects potential SSRF attempts against GPT Researcher by monitoring for suspicious URL patterns in the source_urls parameter.
Detect GPT Researcher SSRF Attempt via External URL
mediumDetects potential SSRF attempts against GPT Researcher by monitoring for suspicious URL patterns in the source_urls parameter to external non-standard ports.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
5
url
| Type | Value |
|---|---|
| url | https://github.com/assafelovic/gpt-researcher/ |
| url | https://github.com/assafelovic/gpt-researcher/issues/1696 |
| url | https://vuldb.com/submit/785876 |
| url | https://vuldb.com/vuln/355421 |
| url | https://vuldb.com/vuln/355421/cti |
| [email protected] |