No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bigsk1
Bigsk1 openai-realtime-ui |
|
| Vendors & Products |
Bigsk1
Bigsk1 openai-realtime-ui |
Wed, 08 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in bigsk1 openai-realtime-ui up to 188ccde27fdf3d8fab8da81f3893468f53b2797c. The affected element is an unknown function of the file server.js of the component API Proxy Endpoint. Performing a manipulation of the argument Query results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is named 54f8f50f43af97c334a881af7b021e84b5b8310f. It is suggested to install a patch to address this issue. | |
| Title | bigsk1 openai-realtime-ui API Proxy Endpoint server.js server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-09T13:51:23.252Z
Reserved: 2026-04-08T14:37:04.019Z
Link: CVE-2026-5803
Updated: 2026-04-09T13:51:19.964Z
Status : Awaiting Analysis
Published: 2026-04-08T21:17:01.977
Modified: 2026-04-08T21:26:13.410
Link: CVE-2026-5803
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:27:24Z