Cyber Posture

CVE-2024-11030

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
14 July 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0030 53.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

GPT Academic version 3.83 is affected by CVE-2024-11030, a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918. The issue resides in the HotReload plugin function, which invokes the crazy_utils.get_files_from_everything() API without adequate input sanitization. This flaw carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), highlighting its potential for high confidentiality impact from remote exploitation.

Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. By crafting malicious requests to the HotReload function, attackers can force the server to make unauthorized outbound requests, abusing the credentials of the victim's GPT Academic Gradio Web server to access restricted web resources.

The primary advisory is available via the Huntr bounty report at https://huntr.com/bounties/729d9928-c28a-40fd-8a86-bb4ca2984bba, which details the vulnerability discovery but does not specify patches or mitigations in the provided information. Security practitioners should review the full report for any recommended remediation steps.

Details

CWE(s)
CWE-918

Affected Products

binary-husky
gpt academic
3.83

AI Security Analysis

AI Category
Other Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Regex match

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The SSRF vulnerability allows unauthenticated remote exploitation of the public-facing Gradio web server via crafted requests to the HotReload function, directly mapping to T1190 Exploit Public-Facing Application for unauthorized access to restricted resources.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References