-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rembg | pip | <= 2.0.57 |
The vulnerability stems from the /api/remove endpoint implementation shown in security advisories. The get_index function accepts a 'url' parameter, uses it in session.get(url) without validation, and processes the response. This pattern matches classic SSRF vulnerabilities where user-controlled URLs enable internal network probing. The confidence is high as the advisory explicitly shows this code pattern and describes its impact.