CVE-2024-11030
Published: 20 March 2025
Summary
CVE-2024-11030 is a high-severity SSRF (CWE-918) vulnerability in Binary-Husky Gpt Academic. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 46.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Other Platforms.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of inputs to the HotReload plugin's crazy_utils.get_files_from_everything() API to prevent SSRF exploitation via malicious requests.
Enforces approved policies for controlling outbound information flows, restricting the Gradio Web server from accessing unauthorized web resources triggered by SSRF.
Monitors and controls communications at system boundaries to block unauthorized outbound requests abused by the SSRF vulnerability using server credentials.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The SSRF vulnerability allows unauthenticated remote exploitation of the public-facing Gradio web server via crafted requests to the HotReload function, directly mapping to T1190 Exploit Public-Facing Application for unauthorized access to restricted resources.
NVD Description
GPT Academic version 3.83 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability through its HotReload plugin function, which calls the crazy_utils.get_files_from_everything() API without proper sanitization. This allows attackers to exploit the vulnerability to abuse the victim GPT Academic's Gradio…
more
Web server's credentials to access unauthorized web resources.
Deeper analysisAI
GPT Academic version 3.83 is affected by CVE-2024-11030, a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918. The issue resides in the HotReload plugin function, which invokes the crazy_utils.get_files_from_everything() API without adequate input sanitization. This flaw carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), highlighting its potential for high confidentiality impact from remote exploitation.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. By crafting malicious requests to the HotReload function, attackers can force the server to make unauthorized outbound requests, abusing the credentials of the victim's GPT Academic Gradio Web server to access restricted web resources.
The primary advisory is available via the Huntr bounty report at https://huntr.com/bounties/729d9928-c28a-40fd-8a86-bb4ca2984bba, which details the vulnerability discovery but does not specify patches or mitigations in the provided information. Security practitioners should review the full report for any recommended remediation steps.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Regex match