Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25534: CWE-918: Server-Side Request Forgery (SSRF) in io.spinnaker.clouddriver clouddriver-artifacts

0
Critical
VulnerabilityCVE-2026-25534cvecve-2026-25534cwe-918
Published: Tue Mar 17 2026 (03/17/2026, 17:27:41 UTC)
Source: CVE Database V5
Vendor/Project: io.spinnaker.clouddriver
Product: clouddriver-artifacts

Description

### Impact Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the previous CVE (CVE-2025-61916) through the use of carefully crafted URLs. Note, Spinnaker found this not just in that CVE, but in the existing URL validations in Orca fromUrl expression handling. This CVE impacts BOTH artifacts as a result. ### Patches This has been merged and will be available in versions 2025.4.1, 2025.3.1, 2025.2.4 and 2026.0.0. ### Workarounds You can disable the various artifacts on this system to work around these limits.

AI-Powered Analysis

AILast updated: 03/17/2026, 17:59:07 UTC

Technical Analysis

CVE-2026-25534 is a critical Server-Side Request Forgery (SSRF) vulnerability identified in the io.spinnaker.clouddriver clouddriver-artifacts component of the Spinnaker continuous delivery platform. The vulnerability stems from insufficient URL validation logic that fails to correctly handle underscores in URLs when parsed by Java URL objects. This parsing flaw allows attackers to bypass prior URL validation protections, including those implemented for a previous vulnerability (CVE-2025-61916). The issue affects multiple versions of clouddriver-artifacts prior to patched releases 2025.2.4, 2025.3.1, 2025.4.1, and 2026.0.0. The vulnerability impacts both the clouddriver and Orca components due to shared URL validation logic. Exploiting this SSRF flaw enables an attacker with limited privileges to craft malicious URLs that cause the server to make unauthorized HTTP requests to internal or external resources. This can lead to unauthorized data disclosure, partial service disruption, or further internal network reconnaissance. The vulnerability requires no user interaction and has a low attack complexity, but does require some level of privileges (PR:L). The CVSS v3.1 base score is 9.1, reflecting critical severity with high confidentiality impact, limited integrity impact, and some availability impact. No known exploits have been reported in the wild yet. Spinnaker has released patches in the specified versions to address this issue by improving URL validation logic. As a temporary mitigation, disabling artifact features that process user-supplied URLs can reduce risk. Given Spinnaker’s widespread use in cloud-native continuous delivery pipelines, this vulnerability poses a significant risk to organizations relying on these systems for software deployment and artifact management.

Potential Impact

The SSRF vulnerability in Spinnaker’s clouddriver-artifacts can have severe consequences for organizations worldwide. By exploiting this flaw, attackers can induce the server to send crafted requests to internal or external systems, potentially bypassing network segmentation and firewall rules. This can lead to unauthorized access to sensitive internal services, leakage of confidential data, and reconnaissance of internal infrastructure. The partial integrity impact means attackers might manipulate artifact retrieval or deployment processes, potentially injecting malicious artifacts or disrupting deployment workflows. Availability impact, though limited, could result from resource exhaustion or denial of service conditions triggered by malicious requests. Organizations using Spinnaker in critical continuous delivery pipelines risk operational disruption and compromise of software supply chain integrity. The vulnerability’s ease of exploitation and high confidentiality impact make it attractive for attackers aiming to escalate privileges or pivot within cloud environments. The lack of required user interaction further increases the threat. Overall, this vulnerability threatens confidentiality, integrity, and availability of deployment pipelines and associated infrastructure, potentially leading to significant operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2026-25534, organizations should promptly apply the official patches released in Spinnaker versions 2025.2.4, 2025.3.1, 2025.4.1, and 2026.0.0, which address the URL validation bypass. Patch management processes should prioritize these updates due to the critical severity. As an immediate workaround, disabling artifact-related features that process user-supplied URLs can reduce exposure until patches are applied. Additionally, organizations should implement strict network segmentation and egress filtering to limit the ability of compromised services to reach sensitive internal resources. Monitoring and logging of outbound requests from clouddriver components can help detect anomalous SSRF attempts. Security teams should audit deployment pipelines for unusual artifact retrieval patterns and validate all user inputs rigorously. Employing Web Application Firewalls (WAFs) with SSRF detection rules can provide an additional layer of defense. Finally, conducting regular security assessments of continuous delivery infrastructure and updating threat models to include SSRF risks will improve long-term resilience.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.373Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b992ba771bdb1749c53e0f

Added to database: 3/17/2026, 5:43:22 PM

Last enriched: 3/17/2026, 5:59:07 PM

Last updated: 3/18/2026, 5:22:27 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses