A Server-Side Request Forgery (SSRF) vulnerability has been identified in GPT Academic versions up to and including the latest. This flaw stems from insufficient input validation within the HotReload plugin's crazyutils.getfilesfromeverything() function, allowing attackers to potentially abuse the application's Gradio Web server credentials. Successful exploitation could grant unauthorized access to internal resources and sensitive data.
The SSRF vulnerability in GPT Academic allows an attacker to craft malicious requests that the application will execute on its own behalf. Because the crazyutils.getfilesfromeverything() function is called without proper sanitization, an attacker can manipulate the request to target internal services or external resources that the application should not be accessing. This could lead to the exposure of sensitive data, unauthorized access to internal systems, or even the potential for further exploitation if the Gradio Web server has weak credentials. The blast radius extends to any resources accessible by the Gradio Web server, potentially impacting other applications or services running on the same infrastructure.
The vulnerability was publicly disclosed on 2025-03-20. There are currently no known public proof-of-concept exploits available. The CVSS score of 7.7 (HIGH) indicates a moderate probability of exploitation. It is not currently listed on the CISA KEV catalog. Attackers could potentially leverage this vulnerability to gain unauthorized access to internal resources and sensitive data within the GPT Academic environment.
Organizations utilizing GPT Academic, particularly those deploying it in environments with sensitive data or internal services accessible through the Gradio Web server, are at risk. Those using older, unpatched versions of GPT Academic are especially vulnerable. Shared hosting environments where multiple users share the same GPT Academic instance could also be affected, potentially allowing one user to exploit the vulnerability to access resources belonging to other users.
• python / server:
import requests
import sys
def check_ssrf(url):
try:
response = requests.get(url, timeout=5, verify=False)
print(f"[+] URL {url} returned status code: {response.status_code}")
return True
except requests.exceptions.RequestException as e:
print(f"[-] URL {url} failed: {e}")
return False
if __name__ == "__main__":
if len(sys.argv) > 1:
target_url = sys.argv[1]
if check_ssrf(target_url):
print("[!] SSRF vulnerability detected!")
else:
print("[+] SSRF vulnerability not detected.")
else:
print("Usage: python check_ssrf.py <target_url>")disclosure
Exploit-Status
EPSS
0.07% (21% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-11030 is to upgrade to a patched version of GPT Academic as soon as it becomes available. Until a patch is released, consider implementing temporary workarounds. These may include restricting network access to the Gradio Web server, implementing strict firewall rules to limit outbound connections, and carefully reviewing the configuration of the crazyutils.getfilesfromeverything() function to ensure it is not being misused. Monitor application logs for unusual outbound requests originating from the HotReload plugin. After upgrading, confirm the fix by attempting to trigger the SSRF vulnerability with a known malicious URL and verifying that the request is blocked.
Aktualisieren Sie GPT Academic auf die neueste verfügbare Version. Stellen Sie sicher, dass das HotReload Plugin aktualisiert ist und dass die erforderlichen Sicherheitsmaßnahmen zur Verhinderung von SSRF-Angriffen implementiert wurden. Überprüfen Sie die Plugin-Konfiguration und beschränken Sie den Zugriff auf nicht autorisierte Web-Ressourcen.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-11030 is a Server-Side Request Forgery (SSRF) vulnerability in GPT Academic versions up to the latest, stemming from insufficient input validation in the HotReload plugin.
If you are using GPT Academic version 3.83 or earlier, you are potentially affected by this SSRF vulnerability. Upgrade to a patched version as soon as possible.
The recommended fix is to upgrade to a patched version of GPT Academic. Until a patch is available, consider implementing temporary workarounds like restricting network access and reviewing plugin configurations.
As of the current disclosure date, there are no confirmed reports of active exploitation, but the vulnerability's severity warrants immediate attention and mitigation.
Refer to the official GPT Academic documentation and security advisories for the latest information and updates regarding CVE-2024-11030.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.