Unrated severityNVD Advisory· Published Feb 16, 2026· Updated Feb 23, 2026
lintsinghua DeepAudit IP Address embedding_config.py server-side request forgery
CVE-2026-2532
Description
A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown processing of the file backend/app/api/v1/endpoints/embedding_config.py of the component IP Address Handler. Performing a manipulation results in server-side request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.0.4 and 3.1.0 is capable of addressing this issue. The patch is named da853fdd8cbe9d42053b45d83f25708ba29b8b27. It is suggested to upgrade the affected component.
Affected products
1- Range: 3.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/lintsinghua/DeepAudit/commit/da853fdd8cbe9d42053b45d83f25708ba29b8b27mitrepatch
- github.com/lintsinghua/DeepAudit/releases/tag/v3.0.4mitrepatch
- vuldb.commitrethird-party-advisory
- github.com/lintsinghua/DeepAudit/issues/144mitreissue-tracking
- github.com/lintsinghua/DeepAudit/pull/145mitreissue-tracking
- vuldb.commitresignaturepermissions-required
- vuldb.commitrevdb-entrytechnical-description
News mentions
0No linked articles in our index yet.