Server-Side Request Forgery Vulnerability in bigsk1 OpenAI Realtime UI
CVE-2026-5803
Key Information:
- Vendor
Bigsk1
- Status
- Vendor
- CVE Published:
- 8 April 2026
Badges
What is CVE-2026-5803?
A security flaw has been identified in the bigsk1 OpenAI Realtime UI affecting its API Proxy Endpoint, specifically within the server.js file. This vulnerability allows a remote attacker to exploit an unknown function by manipulating the argument Query, enabling server-side request forgery. The attack vector can be triggered remotely, posing significant risks. Continuous delivery with rolling releases means that affected or updated versions may not be specifically listed. A patch has been issued for this flaw, and it is highly recommended that users apply the relevant updates promptly to secure their environments.
Affected Version(s)
openai-realtime-ui 188ccde27fdf3d8fab8da81f3893468f53b2797c
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
