<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5633 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5633/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 08:16:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5633/feed.xml" rel="self" type="application/rss+xml"/><item><title>GPT Researcher Server-Side Request Forgery Vulnerability (CVE-2026-5633)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-ssrf/</link><pubDate>Mon, 06 Apr 2026 08:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in assafelovic gpt-researcher up to version 3.4.3, affecting the ws Endpoint component, allowing a remote attacker to manipulate the source_urls argument and potentially access internal resources or conduct further attacks.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-5633, affects assafelovic&rsquo;s gpt-researcher version 3.4.3 and earlier. The vulnerability resides within the ws Endpoint component and is triggered by manipulating the <code>source_urls</code> argument. This flaw allows a remote attacker to potentially force the application to make requests to arbitrary internal or external resources. A publicly disclosed exploit exists, increasing the risk of exploitation. The developers were notified through an issue report, but have not yet responded. This vulnerability is a significant concern for organizations using gpt-researcher, as it can lead to sensitive data exposure or further attacks originating from the application&rsquo;s server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a gpt-researcher instance running version 3.4.3 or earlier.</li>
<li>Attacker crafts a malicious request containing a manipulated <code>source_urls</code> argument. This URL points to an internal resource or an external server controlled by the attacker.</li>
<li>The gpt-researcher application, specifically the ws Endpoint component, processes the request without proper validation of the <code>source_urls</code> parameter.</li>
<li>The application initiates a request to the attacker-specified URL, effectively acting as a proxy.</li>
<li>If the URL points to an internal resource, the attacker gains access to potentially sensitive data or internal services not intended for public access.</li>
<li>If the URL points to an external server controlled by the attacker, the server receives the request, revealing information about the gpt-researcher instance, such as its IP address.</li>
<li>The attacker can then leverage this information to further compromise the server or the network it resides on, potentially leading to lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5633 can allow an attacker to perform actions they are not authorized to do. This includes reading internal data, accessing internal services, or using the vulnerable server as a proxy for further attacks. While the exact number of victims is unknown, any organization using a vulnerable version of gpt-researcher is at risk. The consequences of a successful SSRF attack can range from information disclosure to full server compromise, depending on the internal resources accessible to the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server access logs for requests containing suspicious URLs in the <code>source_urls</code> parameter that point to internal or unexpected external resources. This can aid in detecting ongoing exploitation attempts (logsource: webserver, product: linux/windows).</li>
<li>Apply input validation to the <code>source_urls</code> parameter to ensure that the application only makes requests to authorized and expected resources.</li>
<li>Monitor network connections originating from the gpt-researcher server for unusual outbound traffic to internal or external IP addresses (logsource: network_connection, product: windows/linux).</li>
<li>Deploy the provided Sigma rule to detect potential SSRF attempts by monitoring for suspicious URL patterns in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-5633</category><category>gpt-researcher</category></item></channel></rss>