<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(sysdig.com) LMDeploy SSRF Vulnerability CVE-2026-33626 Exploited Within Hours of Disclosure Against AI Inference Infrastructure]]></title><description><![CDATA[<p>(sysdig.com) LMDeploy SSRF Vulnerability CVE-2026-33626 Exploited Within Hours of Disclosure Against AI Inference Infrastructure</p><p>New SSRF in LMDeploy (CVE-2026-33626) exploited 12h31m post-disclosure against AI inference infra. Attacker scanned AWS IMDS, Redis, MySQL, and admin endpoints via crafted image_url in /v1/chat/completions. OOB DNS to requestrepo.com confirmed blind SSRF.</p><p>In brief - A critical SSRF in LMDeploy, used for vision-language models, was weaponized within hours of disclosure. Attackers targeted cloud metadata, internal services, and inference clusters, highlighting rapid exploitation of AI infrastructure vulnerabilities.</p><p>Technically - CVE-2026-33626 stems from missing hostname validation in LMDeploy’s image URL loader. Attacker sent POST requests with SSRF payloads to 169.254.169.254 (IMDS), 127.0.0.1:6379/3306/8080, and /distserve/p2p_drop_connect. Detection via Falco rules for IMDS contact; remediation requires LMDeploy v0.12.3, IMDSv2 with httpTokens=required, and VPC egress controls.</p><p>Source: <a href="https://webflow.sysdig.com/blog/cve-2026-33626-how-attackers-exploited-lmdeploy-llm-inference-engines-in-12-hours" rel="nofollow noopener"><span>https://</span><span>webflow.sysdig.com/blog/cve-20</span><span>26-33626-how-attackers-exploited-lmdeploy-llm-inference-engines-in-12-hours</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/8608bf50-c16e-4491-911f-c659182cb8d1/sysdig.com-lmdeploy-ssrf-vulnerability-cve-2026-33626-exploited-within-hours-of-disclosure-against-ai-inference-infrastructure</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 07:51:36 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/8608bf50-c16e-4491-911f-c659182cb8d1.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 22 Apr 2026 17:41:59 GMT</pubDate><ttl>60</ttl></channel></rss>