Untriaged
Permalink
CVE-2026-27023
5.0 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): NONE
Activity log
- Created suggestion
Twenty: SSRF protection bypass via HTTP redirect following in secure HTTP client
Twenty is an open source CRM. Prior to version 1.18, the SSRF protection in SecureHttpClientService validated request URLs at the request level but did not validate redirect targets. An authenticated user who could control outbound request URLs (e.g., webhook endpoints, image URLs) could bypass private IP blocking by redirecting through an attacker-controlled server. This issue has been patched in version 1.18.
References
-
https://github.com/twentyhq/twenty/security/advisories/GHSA-wm7q-rvq3-x8q9 x_refsource_CONFIRM
-
https://github.com/twentyhq/twenty/releases/tag/v1.18.0 x_refsource_MISC
Affected products
twenty
- ==< 1.18
Matching in nixpkgs
pkgs.gnome-2048
Obtain the 2048 tile
pkgs.wordpressPackages.themes.twentytwenty
None
pkgs.wordpressPackages.themes.twentynineteen
None
pkgs.wordpressPackages.themes.twentytwentyone
None
pkgs.wordpressPackages.themes.twentytwentytwo
None
Package maintainers
-
@hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
-
@jtojnar Jan Tojnar <jtojnar@gmail.com>
-
@bobby285271 Bobby Rong <rjl931189261@126.com>
-
@dasj19 Daniel Șerbănescu <daniel@serbanescu.dk>