Huimeicloud hm_editor Server-Side Request Forgery Vulnerability (CVE-2026-5346)
A server-side request forgery (SSRF) vulnerability exists in huimeicloud hm_editor up to version 2.2.3, allowing remote attackers to manipulate the 'url' argument in the client.get function of src/mcp-server.js to potentially access internal resources.
A server-side request forgery (SSRF) vulnerability has been identified in huimeicloud hm_editor, specifically affecting versions up to 2.2.3. The vulnerability resides within the client.get function in the src/mcp-server.js file, which is part of the image-to-base64 endpoint. By manipulating the url argument, a remote attacker can potentially force the server to make requests to unintended locations, including internal resources. This vulnerability, identified as CVE-2026-5346, has a CVSS v3.1 score of 7.3 and is remotely exploitable. Public exploits are available. The vendor was notified but has not responded.
Attack Chain
- The attacker identifies an instance of huimeicloud hm_editor running version 2.2.3 or earlier.
- The attacker crafts a malicious URL containing a payload designed to exploit the SSRF vulnerability in the image-to-base64 endpoint.
- The attacker sends a request to the vulnerable endpoint (
src/mcp-server.js) with the craftedurlparameter. - The
client.getfunction processes the attacker-controlledurlargument without proper validation. - The server-side application initiates an HTTP request based on the manipulated URL, potentially targeting internal resources or external services.
- The server receives the response from the targeted resource.
- The server may process and return the data obtained from the targeted resource to the attacker or use it internally.
- The attacker gains unauthorized access to internal information or leverages the server as a proxy for further attacks.
Impact
Successful exploitation of this SSRF vulnerability (CVE-2026-5346) can lead to unauthorized access to internal resources, sensitive data exposure, and the ability to use the vulnerable server as a proxy for further attacks. The impact includes potential compromise of internal systems, circumvention of security controls, and data breaches. The affected component is the image-to-base64 endpoint, which may be used to process user-supplied images.
Recommendation
- Apply input validation and sanitization to the
urlargument passed to theclient.getfunction within thesrc/mcp-server.jsfile to prevent SSRF attacks, mitigating CVE-2026-5346. - Monitor web server logs for suspicious requests targeting the image-to-base64 endpoint (
src/mcp-server.js) with unusualurlparameters, using the provided Sigma rule to identify exploitation attempts. - Implement network segmentation to limit the impact of successful SSRF attacks by restricting access to internal resources from the vulnerable server.
- Deploy the Sigma rule to detect attempts to exploit CVE-2026-5346, focusing on unusual URLs being passed to the
image-to-base64endpoint.
Detection coverage 2
Detect SSRF Attempt in huimeicloud hm_editor
highDetects potential Server-Side Request Forgery (SSRF) attempts in huimeicloud hm_editor by monitoring requests to the image-to-base64 endpoint with suspicious URLs.
Detect hm_editor SSRF Attempt with Encoded URL
mediumDetects SSRF attempts against the hm_editor image-to-base64 endpoint using a base64 encoded URL.
Detection queries are kept inside the platform. Get full rules →