Description
A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
2.2.1
2.2.2
2.2.3
Timeline
| 2026-04-01: | Advisory disclosed |
| 2026-04-01: | VulDB entry created |
| 2026-04-01: | VulDB entry last update |
Credits
BigW (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/354701 (VDB-354701 | huimeicloud hm_editor image-to-base64 Endpoint mcp-server.js client.get server-side request forgery)
vuldb.com/vuln/354701/cti (VDB-354701 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/781341 (Submit #781341 | huimeicloud hmEditor 2.2.3 Server-Side Request Forgery)
github.com/wing3e/public_exp/issues/11