CVE-2026-5803 PUBLISHED

bigsk1 openai-realtime-ui API Proxy Endpoint server.js server-side request forgery

Assigner: VulDB
Reserved: 08.04.2026 Published: 08.04.2026 Updated: 08.04.2026

A security flaw has been discovered in bigsk1 openai-realtime-ui up to 188ccde27fdf3d8fab8da81f3893468f53b2797c. The affected element is an unknown function of the file server.js of the component API Proxy Endpoint. Performing a manipulation of the argument Query results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is named 54f8f50f43af97c334a881af7b021e84b5b8310f. It is suggested to install a patch to address this issue.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 5.3

Product Status

Vendor bigsk1
Product openai-realtime-ui
Versions
  • Version 188ccde27fdf3d8fab8da81f3893468f53b2797c is affected

Credits

  • BruceJin (VulDB User) reporter

References

Problem Types

  • Server-Side Request Forgery CWE