Action not permitted
Modal body text goes here.
Modal Title
Modal Body
fkie_cve-2025-6242
Vulnerability from fkie_nvd
Published
2025-10-07 20:15
Modified
2025-10-08 19:38
Severity ?
Summary
A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch and process media from user-provided URLs without adequate restrictions on the target hosts. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project\u0027s multimodal feature set. The load_from_url and load_from_url_async methods fetch and process media from user-provided URLs without adequate restrictions on the target hosts. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources." } ], "id": "CVE-2025-6242", "lastModified": "2025-10-08T19:38:09.863", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.5, "source": "secalert@redhat.com", "type": "Primary" } ] }, "published": "2025-10-07T20:15:36.187", "references": [ { "source": "secalert@redhat.com", "url": "https://access.redhat.com/security/cve/CVE-2025-6242" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373716" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "secalert@redhat.com", "type": "Primary" } ] }
CVE-2025-6242 (GCVE-0-2025-6242)
Vulnerability from cvelistv5
Published
2025-10-07 19:45
Modified
2025-10-07 19:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Summary
A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch and process media from user-provided URLs without adequate restrictions on the target hosts. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/security/cve/CVE-2025-6242 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2373716 | issue-tracking, x_refsource_REDHAT |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6242", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-10-07T19:55:28.751523Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-07T19:57:03.472Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:ai_inference_server:3" ], "defaultStatus": "affected", "packageName": "rhaiis-preview/vllm-cuda-rhel9", "product": "Red Hat AI Inference Server", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:ai_inference_server:3" ], "defaultStatus": "affected", "packageName": "rhaiis/vllm-cuda-rhel9", "product": "Red Hat AI Inference Server", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:ai_inference_server:3" ], "defaultStatus": "affected", "packageName": "rhaiis/vllm-rocm-rhel9", "product": "Red Hat AI Inference Server", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:ai_inference_server:3" ], "defaultStatus": "affected", "packageName": "rhaiis/vllm-tpu-rhel9", "product": "Red Hat AI Inference Server", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/bootc-amd-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/bootc-aws-nvidia-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/bootc-azure-amd-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/bootc-azure-nvidia-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/bootc-gcp-nvidia-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/bootc-intel-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/bootc-nvidia-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/disk-image-nvidia-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/docling-serve-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/gemma-2-9b-it", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/gemma-2-9b-it-fp8", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-3.1-8b-lab-v1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-3.1-8b-lab-v2.1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-3.1-8b-starter-v1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-3.1-8b-starter-v2.1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-7b-redhat-lab", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-7b-starter", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-8b-code-base", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-8b-code-instruct", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-8b-lab-v1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-8b-lab-v2-preview", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/granite-8b-starter-v1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/instructlab-amd-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/instructlab-intel-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/instructlab-nvidia-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/knowledge-adapter-v3", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/mixtral-8x7b-instruct-v0-1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-docling-layout", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-docling-tableformer", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-gemma-2-9b-it", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-gemma-2-9b-it-fp8", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-3-1-8b-lab-v1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-3-1-8b-lab-v2", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-3-1-8b-lab-v2-1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-3-1-8b-starter-v1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-3-1-8b-starter-v2", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-3-1-8b-starter-v2-1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-7b-redhat-lab", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-7b-starter", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-8b-code-base", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-8b-code-instruct", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-8b-lab-v1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-8b-lab-v2-preview", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-granite-8b-starter-v1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-knowledge-adapter-v3", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-mixtral-8x7b-instruct-v0-1", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-prometheus-8x7b-v2-0", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-skills-adapter-v3", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/modelcar-snowflake-arctic-embed-l-v2.0", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/pathservice-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/prometheus-8x7b-v2-0", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/skills-adapter-v3", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/ui-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" } ], "datePublic": "2025-10-07T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project\u0027s multimodal feature set. The load_from_url and load_from_url_async methods fetch and process media from user-provided URLs without adequate restrictions on the target hosts. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Important" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-07T19:45:18.082Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2025-6242" }, { "name": "RHBZ#2373716", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373716" } ], "timeline": [ { "lang": "en", "time": "2025-06-18T15:26:47.633000+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2025-10-07T00:00:00+00:00", "value": "Made public." } ], "title": "Vllm: server side request forgery (ssrf) in mediaconnector", "workarounds": [ { "lang": "en", "value": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible." } ], "x_redhatCweChain": "CWE-918: Server-Side Request Forgery (SSRF)" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2025-6242", "datePublished": "2025-10-07T19:45:18.082Z", "dateReserved": "2025-06-18T15:26:11.100Z", "dateUpdated": "2025-10-07T19:57:03.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…