<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Huimeicloud — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/huimeicloud/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 15:16:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/huimeicloud/feed.xml" rel="self" type="application/rss+xml"/><item><title>Huimeicloud hm_editor Server-Side Request Forgery Vulnerability (CVE-2026-5346)</title><link>https://feed.craftedsignal.io/briefs/2026-04-huimeicloud-ssrf/</link><pubDate>Thu, 02 Apr 2026 15:16:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-huimeicloud-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in huimeicloud hm_editor up to version 2.2.3, allowing remote attackers to manipulate the 'url' argument in the client.get function of src/mcp-server.js to potentially access internal resources.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability has been identified in huimeicloud hm_editor, specifically affecting versions up to 2.2.3. The vulnerability resides within the <code>client.get</code> function in the <code>src/mcp-server.js</code> file, which is part of the image-to-base64 endpoint. By manipulating the <code>url</code> argument, a remote attacker can potentially force the server to make requests to unintended locations, including internal resources. This vulnerability, identified as CVE-2026-5346, has a CVSS v3.1 score of 7.3 and is remotely exploitable. Public exploits are available. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of huimeicloud hm_editor running version 2.2.3 or earlier.</li>
<li>The attacker crafts a malicious URL containing a payload designed to exploit the SSRF vulnerability in the image-to-base64 endpoint.</li>
<li>The attacker sends a request to the vulnerable endpoint (<code>src/mcp-server.js</code>) with the crafted <code>url</code> parameter.</li>
<li>The <code>client.get</code> function processes the attacker-controlled <code>url</code> argument without proper validation.</li>
<li>The server-side application initiates an HTTP request based on the manipulated URL, potentially targeting internal resources or external services.</li>
<li>The server receives the response from the targeted resource.</li>
<li>The server may process and return the data obtained from the targeted resource to the attacker or use it internally.</li>
<li>The attacker gains unauthorized access to internal information or leverages the server as a proxy for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-5346) can lead to unauthorized access to internal resources, sensitive data exposure, and the ability to use the vulnerable server as a proxy for further attacks. The impact includes potential compromise of internal systems, circumvention of security controls, and data breaches. The affected component is the <code>image-to-base64</code> endpoint, which may be used to process user-supplied images.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>url</code> argument passed to the <code>client.get</code> function within the <code>src/mcp-server.js</code> file to prevent SSRF attacks, mitigating CVE-2026-5346.</li>
<li>Monitor web server logs for suspicious requests targeting the image-to-base64 endpoint (<code>src/mcp-server.js</code>) with unusual <code>url</code> parameters, using the provided Sigma rule to identify exploitation attempts.</li>
<li>Implement network segmentation to limit the impact of successful SSRF attacks by restricting access to internal resources from the vulnerable server.</li>
<li>Deploy the Sigma rule to detect attempts to exploit CVE-2026-5346, focusing on unusual URLs being passed to the <code>image-to-base64</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-5346</category><category>ssrf</category><category>huimeicloud</category></item></channel></rss>