Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in bigsk1 openai-realtime-ui up to 188ccde27fdf3d8fab8da81f3893468f53b2797c. The affected element is an unknown function of the file server.js of the component API Proxy Endpoint. Performing a manipulation of the argument Query results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is named 54f8f50f43af97c334a881af7b021e84b5b8310f. It is suggested to install a patch to address this issue. | |
| Title | bigsk1 openai-realtime-ui API Proxy Endpoint server.js server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-08T20:15:20.839Z
Reserved: 2026-04-08T14:37:04.019Z
Link: CVE-2026-5803
No data.
Status : Awaiting Analysis
Published: 2026-04-08T21:17:01.977
Modified: 2026-04-08T21:26:13.410
Link: CVE-2026-5803
No data.
OpenCVE Enrichment
No data.