<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gpt-Researcher — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/gpt-researcher/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 08:16:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/gpt-researcher/feed.xml" rel="self" type="application/rss+xml"/><item><title>GPT Researcher Server-Side Request Forgery Vulnerability (CVE-2026-5633)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-ssrf/</link><pubDate>Mon, 06 Apr 2026 08:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in assafelovic gpt-researcher up to version 3.4.3, affecting the ws Endpoint component, allowing a remote attacker to manipulate the source_urls argument and potentially access internal resources or conduct further attacks.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-5633, affects assafelovic&rsquo;s gpt-researcher version 3.4.3 and earlier. The vulnerability resides within the ws Endpoint component and is triggered by manipulating the <code>source_urls</code> argument. This flaw allows a remote attacker to potentially force the application to make requests to arbitrary internal or external resources. A publicly disclosed exploit exists, increasing the risk of exploitation. The developers were notified through an issue report, but have not yet responded. This vulnerability is a significant concern for organizations using gpt-researcher, as it can lead to sensitive data exposure or further attacks originating from the application&rsquo;s server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a gpt-researcher instance running version 3.4.3 or earlier.</li>
<li>Attacker crafts a malicious request containing a manipulated <code>source_urls</code> argument. This URL points to an internal resource or an external server controlled by the attacker.</li>
<li>The gpt-researcher application, specifically the ws Endpoint component, processes the request without proper validation of the <code>source_urls</code> parameter.</li>
<li>The application initiates a request to the attacker-specified URL, effectively acting as a proxy.</li>
<li>If the URL points to an internal resource, the attacker gains access to potentially sensitive data or internal services not intended for public access.</li>
<li>If the URL points to an external server controlled by the attacker, the server receives the request, revealing information about the gpt-researcher instance, such as its IP address.</li>
<li>The attacker can then leverage this information to further compromise the server or the network it resides on, potentially leading to lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5633 can allow an attacker to perform actions they are not authorized to do. This includes reading internal data, accessing internal services, or using the vulnerable server as a proxy for further attacks. While the exact number of victims is unknown, any organization using a vulnerable version of gpt-researcher is at risk. The consequences of a successful SSRF attack can range from information disclosure to full server compromise, depending on the internal resources accessible to the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server access logs for requests containing suspicious URLs in the <code>source_urls</code> parameter that point to internal or unexpected external resources. This can aid in detecting ongoing exploitation attempts (logsource: webserver, product: linux/windows).</li>
<li>Apply input validation to the <code>source_urls</code> parameter to ensure that the application only makes requests to authorized and expected resources.</li>
<li>Monitor network connections originating from the gpt-researcher server for unusual outbound traffic to internal or external IP addresses (logsource: network_connection, product: windows/linux).</li>
<li>Deploy the provided Sigma rule to detect potential SSRF attempts by monitoring for suspicious URL patterns in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-5633</category><category>gpt-researcher</category></item><item><title>GPT Researcher Code Injection Vulnerability (CVE-2026-5631)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-code-injection/</link><pubDate>Mon, 06 Apr 2026 07:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-code-injection/</guid><description>A remote code injection vulnerability exists in assafelovic gpt-researcher versions up to 3.4.3 due to improper handling of the 'args' argument in the extract_command_data function, potentially allowing attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A code injection vulnerability, identified as CVE-2026-5631, affects assafelovic gpt-researcher up to version 3.4.3. The vulnerability resides in the <code>extract_command_data</code> function within the <code>backend/server/server_utils.py</code> file, specifically in the <code>ws Endpoint</code> component. By manipulating the <code>args</code> argument, a remote attacker can inject and execute arbitrary code on the affected system. Public exploit code is available, increasing the risk of exploitation. The maintainers of the <code>gpt-researcher</code> project have been notified of this vulnerability through an issue report, but have yet to respond. This vulnerability allows for unauthenticated remote code execution, severely impacting the confidentiality, integrity, and availability of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of <code>gpt-researcher</code> running version 3.4.3 or earlier.</li>
<li>The attacker crafts a malicious payload designed to exploit the <code>extract_command_data</code> function within <code>backend/server/server_utils.py</code>.</li>
<li>The attacker sends a specially crafted request containing the malicious payload to the <code>ws Endpoint</code> via a remote connection.</li>
<li>The <code>extract_command_data</code> function processes the attacker-supplied <code>args</code> without proper sanitization or validation.</li>
<li>Due to the missing input validation, the malicious payload is interpreted as code.</li>
<li>The injected code is executed within the context of the <code>gpt-researcher</code> application, potentially granting the attacker elevated privileges.</li>
<li>The attacker establishes a reverse shell to gain persistent access to the server.</li>
<li>The attacker compromises sensitive data or pivots to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5631 allows a remote, unauthenticated attacker to execute arbitrary code on the server running the vulnerable <code>gpt-researcher</code> instance. The attacker can gain complete control of the affected system, potentially leading to data breaches, service disruption, or further lateral movement within the network. Given that <code>gpt-researcher</code> is often used in research or development environments, the compromise could result in the theft of sensitive intellectual property or research data. The ease of exploitation due to the availability of public exploits increases the likelihood of widespread attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of <code>gpt-researcher</code> as soon as one becomes available to remediate CVE-2026-5631.</li>
<li>Deploy the following Sigma rule to detect potential exploitation attempts targeting the <code>extract_command_data</code> function.</li>
<li>Monitor network traffic for suspicious requests to the <code>ws Endpoint</code> associated with <code>gpt-researcher</code> to identify potential exploitation attempts.</li>
<li>Implement input validation and sanitization measures within the <code>extract_command_data</code> function to prevent code injection, as suggested by CVE-2026-5631.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>vulnerability</category><category>gpt-researcher</category></item></channel></rss>