No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in letta-ai letta 0.16.4. This vulnerability affects the function _convert_message_create_to_message of the file letta/helpers/message_helper.py of the component File URL Handler. Such manipulation of the argument ImageContent leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data. | |
| Title | letta-ai letta File URL message_helper.py _convert_message_create_to_message server-side request forgery | |
| First Time appeared |
Letta
Letta letta |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:2.3:a:letta:letta:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Letta
Letta letta |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-27T17:05:22.689Z
Reserved: 2026-03-27T08:23:08.629Z
Link: CVE-2026-4964
No data.
Status : Received
Published: 2026-03-27T17:16:31.767
Modified: 2026-03-27T17:16:31.767
Link: CVE-2026-4964
No data.
OpenCVE Enrichment
No data.