Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Sun, 05 Apr 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Ollama up to 18.1. This issue affects some unknown processing of the file server/download.go of the component Model Pull API. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Ollama Model Pull API download.go server-side request forgery | |
| First Time appeared |
Ollama
Ollama ollama |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ollama
Ollama ollama |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-06T15:37:44.300Z
Reserved: 2026-04-04T06:29:38.195Z
Link: CVE-2026-5530
Updated: 2026-04-06T15:37:38.377Z
Status : Deferred
Published: 2026-04-05T01:16:48.220
Modified: 2026-04-24T18:13:28.877
Link: CVE-2026-5530
OpenCVE Enrichment
Updated: 2026-04-06T21:57:25Z