CVE-2025-6242 PUBLISHED

Vllm: server side request forgery (ssrf) in mediaconnector

Assigner: redhat
Reserved: 18.06.2025 Published: 07.10.2025 Updated: 07.10.2025

A Server-Side Request Forgery (SSRF) vulnerability exists in the MediaConnector class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods fetch and process media from user-provided URLs without adequate restrictions on the target hosts. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
CVSS Score: 7.1

Product Status

Vendor Red Hat
Product Red Hat AI Inference Server
Versions Default: affected
Vendor Red Hat
Product Red Hat AI Inference Server
Versions Default: affected
Vendor Red Hat
Product Red Hat AI Inference Server
Versions Default: affected
Vendor Red Hat
Product Red Hat AI Inference Server
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI)
Versions Default: affected

Workarounds

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

References

Problem Types

  • Server-Side Request Forgery (SSRF) CWE