GHSA-j7x9-7j54-2v3h

Suggest an improvement
Source
https://github.com/advisories/GHSA-j7x9-7j54-2v3h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-j7x9-7j54-2v3h/GHSA-j7x9-7j54-2v3h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j7x9-7j54-2v3h
Aliases
Published
2026-02-02T12:31:14Z
Modified
2026-02-03T17:53:31.606353Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Hugging Face Text Generation Inference vulnerable to Uncontrolled Resource Consumption
Details

A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Markdown image links and performs a blocking HTTP GET request, reading the entire response body into memory and cloning it before decoding. This behavior can lead to resource exhaustion, including network bandwidth saturation, memory inflation, and CPU overutilization. The vulnerability is triggered even if the request is later rejected for exceeding token limits. The default deployment configuration, which lacks memory usage limits and authentication, exacerbates the impact, potentially crashing the host machine. The issue is resolved in version 3.3.7.

Database specific
{
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "nvd_published_at": "2026-02-02T11:16:17Z",
    "github_reviewed_at": "2026-02-02T22:07:41Z"
}
References

Affected packages

PyPI / text-generation

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.7

Affected versions

0.*
0.1.0
0.2.0
0.2.1
0.3.0
0.3.1
0.4.0
0.4.1
0.5.0
0.5.1
0.5.2
0.6.0
0.6.1
0.7.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-j7x9-7j54-2v3h/GHSA-j7x9-7j54-2v3h.json"