CVE-2024-11031
Published: 20 March 2025
Summary
CVE-2024-11031 is a high-severity SSRF (CWE-918) vulnerability in Binary-Husky Gpt Academic. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 45.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Other Platforms.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the SSRF vulnerability by requiring validation of URL inputs in the Markdown_Translate.get_files_from_everything() API to block arbitrary web host access.
Mitigates SSRF by monitoring and controlling outbound communications from the Gradio Web server to prevent access to unauthorized resources.
Enforces flow control policies to restrict the server from making requests to arbitrary hosts beyond approved destinations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The SSRF vulnerability in the public-facing Gradio Web server (via the Markdown_Translate plugin) directly enables remote exploitation of the application without authentication, allowing arbitrary outbound requests to unauthorized web resources for data access/exfiltration.
NVD Description
In version 3.83 of binary-husky/gpt_academic, a Server-Side Request Forgery (SSRF) vulnerability exists in the Markdown_Translate.get_files_from_everything() API. This vulnerability is exploited through the HotReload(Markdown翻译中) plugin function, which allows downloading arbitrary web hosts by only checking if the link starts with 'http'.…
more
Attackers can exploit this vulnerability to abuse the victim GPT Academic's Gradio Web server's credentials to access unauthorized web resources.
Deeper analysisAI
CVE-2024-11031 is a Server-Side Request Forgery (SSRF) vulnerability, classified as CWE-918, affecting version 3.83 of binary-husky/gpt_academic. The flaw exists in the Markdown_Translate.get_files_from_everything() API and is exploited through the HotReload(Markdown翻译中) plugin function, which performs insufficient validation by only checking if provided links start with 'http'. This allows the plugin to download content from arbitrary web hosts via the affected GPT Academic Gradio Web server.
Attackers require only network access with no authentication or user interaction, as indicated by the CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Exploitation occurs when victims use the plugin with a malicious link, enabling attackers to leverage the Gradio Web server's credentials to access unauthorized web resources and potentially exfiltrate sensitive data.
Mitigation details are available in the Huntr advisory at https://huntr.com/bounties/d27d89a7-7d54-45b9-a9eb-66c00bc56e02.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Regex match