CVE-2026-2711 PUBLISHED

zhutoutoutousan worldquant-miner URL ssrf_proxy.py server-side request forgery

Assigner: VulDB
Reserved: 18.02.2026 Published: 19.02.2026 Updated: 19.02.2026

A vulnerability has been found in zhutoutoutousan worldquant-miner up to 1.0.9. The impacted element is an unknown function of the file worldquant-miner-master/agent-dify-api/core/helper/ssrf_proxy.py of the component URL Handler. The manipulation of the argument make_request leads to server-side request forgery. The attack can be initiated remotely. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.3

Product Status

Vendor zhutoutoutousan
Product worldquant-miner
Versions
  • Version 1.0.0 is affected
  • Version 1.0.1 is affected
  • Version 1.0.2 is affected
  • Version 1.0.3 is affected
  • Version 1.0.4 is affected
  • Version 1.0.5 is affected
  • Version 1.0.6 is affected
  • Version 1.0.7 is affected
  • Version 1.0.8 is affected
  • Version 1.0.9 is affected

Credits

  • ZAST.AI (VulDB User) reporter

References

Problem Types

  • Server-Side Request Forgery CWE