Home

Description

prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token parameter. Attackers can exploit the lack of URL validation to disclose the FAL_API_KEY in the Authorization header, enabling credential theft, internal network probing, and abuse of the victim's Fal.ai account.

PUBLISHED Reserved 2026-01-08 | Published 2026-04-03 | Updated 2026-04-07 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unaffected

Any version before 30a8f0470e0ba45e6be9c9f55220f4a9a6b91c99
affected

Credits

Mehmet Ince @mdisec finder

References

gist.github.com/mdisec/27c0cac0ec6a8f3c8f85a18987ddb942 exploit

gist.github.com/mdisec/27c0cac0ec6a8f3c8f85a18987ddb942 issue-tracking

github.com/...ommit/30a8f0470e0ba45e6be9c9f55220f4a9a6b91c99 patch

www.vulncheck.com/...at-ssrf-via-fal-ai-media-status-polling third-party-advisory

cve.org (CVE-2026-22664)

nvd.nist.gov (CVE-2026-22664)

Download JSON