CVE-2026-25534: CWE-918: Server-Side Request Forgery (SSRF) in io.spinnaker.clouddriver clouddriver-artifacts
### Impact Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the previous CVE (CVE-2025-61916) through the use of carefully crafted URLs. Note, Spinnaker found this not just in that CVE, but in the existing URL validations in Orca fromUrl expression handling. This CVE impacts BOTH artifacts as a result. ### Patches This has been merged and will be available in versions 2025.4.1, 2025.3.1, 2025.2.4 and 2026.0.0. ### Workarounds You can disable the various artifacts on this system to work around these limits.
AI Analysis
Technical Summary
CVE-2026-25534 is a critical Server-Side Request Forgery (SSRF) vulnerability identified in the io.spinnaker.clouddriver clouddriver-artifacts component of the Spinnaker continuous delivery platform. The vulnerability stems from insufficient URL validation logic that fails to correctly handle underscores in URLs when parsed by Java URL objects. This parsing flaw allows attackers to bypass prior URL validation protections, including those implemented for a previous vulnerability (CVE-2025-61916). The issue affects multiple versions of clouddriver-artifacts prior to patched releases 2025.2.4, 2025.3.1, 2025.4.1, and 2026.0.0. The vulnerability impacts both the clouddriver and Orca components due to shared URL validation logic. Exploiting this SSRF flaw enables an attacker with limited privileges to craft malicious URLs that cause the server to make unauthorized HTTP requests to internal or external resources. This can lead to unauthorized data disclosure, partial service disruption, or further internal network reconnaissance. The vulnerability requires no user interaction and has a low attack complexity, but does require some level of privileges (PR:L). The CVSS v3.1 base score is 9.1, reflecting critical severity with high confidentiality impact, limited integrity impact, and some availability impact. No known exploits have been reported in the wild yet. Spinnaker has released patches in the specified versions to address this issue by improving URL validation logic. As a temporary mitigation, disabling artifact features that process user-supplied URLs can reduce risk. Given Spinnaker’s widespread use in cloud-native continuous delivery pipelines, this vulnerability poses a significant risk to organizations relying on these systems for software deployment and artifact management.
Potential Impact
The SSRF vulnerability in Spinnaker’s clouddriver-artifacts can have severe consequences for organizations worldwide. By exploiting this flaw, attackers can induce the server to send crafted requests to internal or external systems, potentially bypassing network segmentation and firewall rules. This can lead to unauthorized access to sensitive internal services, leakage of confidential data, and reconnaissance of internal infrastructure. The partial integrity impact means attackers might manipulate artifact retrieval or deployment processes, potentially injecting malicious artifacts or disrupting deployment workflows. Availability impact, though limited, could result from resource exhaustion or denial of service conditions triggered by malicious requests. Organizations using Spinnaker in critical continuous delivery pipelines risk operational disruption and compromise of software supply chain integrity. The vulnerability’s ease of exploitation and high confidentiality impact make it attractive for attackers aiming to escalate privileges or pivot within cloud environments. The lack of required user interaction further increases the threat. Overall, this vulnerability threatens confidentiality, integrity, and availability of deployment pipelines and associated infrastructure, potentially leading to significant operational and reputational damage.
Mitigation Recommendations
To mitigate CVE-2026-25534, organizations should promptly apply the official patches released in Spinnaker versions 2025.2.4, 2025.3.1, 2025.4.1, and 2026.0.0, which address the URL validation bypass. Patch management processes should prioritize these updates due to the critical severity. As an immediate workaround, disabling artifact-related features that process user-supplied URLs can reduce exposure until patches are applied. Additionally, organizations should implement strict network segmentation and egress filtering to limit the ability of compromised services to reach sensitive internal resources. Monitoring and logging of outbound requests from clouddriver components can help detect anomalous SSRF attempts. Security teams should audit deployment pipelines for unusual artifact retrieval patterns and validate all user inputs rigorously. Employing Web Application Firewalls (WAFs) with SSRF detection rules can provide an additional layer of defense. Finally, conducting regular security assessments of continuous delivery infrastructure and updating threat models to include SSRF risks will improve long-term resilience.
Affected Countries
United States, Germany, Japan, United Kingdom, Canada, Australia, France, Netherlands, South Korea, India
CVE-2026-25534: CWE-918: Server-Side Request Forgery (SSRF) in io.spinnaker.clouddriver clouddriver-artifacts
Description
### Impact Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the previous CVE (CVE-2025-61916) through the use of carefully crafted URLs. Note, Spinnaker found this not just in that CVE, but in the existing URL validations in Orca fromUrl expression handling. This CVE impacts BOTH artifacts as a result. ### Patches This has been merged and will be available in versions 2025.4.1, 2025.3.1, 2025.2.4 and 2026.0.0. ### Workarounds You can disable the various artifacts on this system to work around these limits.
AI-Powered Analysis
Technical Analysis
CVE-2026-25534 is a critical Server-Side Request Forgery (SSRF) vulnerability identified in the io.spinnaker.clouddriver clouddriver-artifacts component of the Spinnaker continuous delivery platform. The vulnerability stems from insufficient URL validation logic that fails to correctly handle underscores in URLs when parsed by Java URL objects. This parsing flaw allows attackers to bypass prior URL validation protections, including those implemented for a previous vulnerability (CVE-2025-61916). The issue affects multiple versions of clouddriver-artifacts prior to patched releases 2025.2.4, 2025.3.1, 2025.4.1, and 2026.0.0. The vulnerability impacts both the clouddriver and Orca components due to shared URL validation logic. Exploiting this SSRF flaw enables an attacker with limited privileges to craft malicious URLs that cause the server to make unauthorized HTTP requests to internal or external resources. This can lead to unauthorized data disclosure, partial service disruption, or further internal network reconnaissance. The vulnerability requires no user interaction and has a low attack complexity, but does require some level of privileges (PR:L). The CVSS v3.1 base score is 9.1, reflecting critical severity with high confidentiality impact, limited integrity impact, and some availability impact. No known exploits have been reported in the wild yet. Spinnaker has released patches in the specified versions to address this issue by improving URL validation logic. As a temporary mitigation, disabling artifact features that process user-supplied URLs can reduce risk. Given Spinnaker’s widespread use in cloud-native continuous delivery pipelines, this vulnerability poses a significant risk to organizations relying on these systems for software deployment and artifact management.
Potential Impact
The SSRF vulnerability in Spinnaker’s clouddriver-artifacts can have severe consequences for organizations worldwide. By exploiting this flaw, attackers can induce the server to send crafted requests to internal or external systems, potentially bypassing network segmentation and firewall rules. This can lead to unauthorized access to sensitive internal services, leakage of confidential data, and reconnaissance of internal infrastructure. The partial integrity impact means attackers might manipulate artifact retrieval or deployment processes, potentially injecting malicious artifacts or disrupting deployment workflows. Availability impact, though limited, could result from resource exhaustion or denial of service conditions triggered by malicious requests. Organizations using Spinnaker in critical continuous delivery pipelines risk operational disruption and compromise of software supply chain integrity. The vulnerability’s ease of exploitation and high confidentiality impact make it attractive for attackers aiming to escalate privileges or pivot within cloud environments. The lack of required user interaction further increases the threat. Overall, this vulnerability threatens confidentiality, integrity, and availability of deployment pipelines and associated infrastructure, potentially leading to significant operational and reputational damage.
Mitigation Recommendations
To mitigate CVE-2026-25534, organizations should promptly apply the official patches released in Spinnaker versions 2025.2.4, 2025.3.1, 2025.4.1, and 2026.0.0, which address the URL validation bypass. Patch management processes should prioritize these updates due to the critical severity. As an immediate workaround, disabling artifact-related features that process user-supplied URLs can reduce exposure until patches are applied. Additionally, organizations should implement strict network segmentation and egress filtering to limit the ability of compromised services to reach sensitive internal resources. Monitoring and logging of outbound requests from clouddriver components can help detect anomalous SSRF attempts. Security teams should audit deployment pipelines for unusual artifact retrieval patterns and validate all user inputs rigorously. Employing Web Application Firewalls (WAFs) with SSRF detection rules can provide an additional layer of defense. Finally, conducting regular security assessments of continuous delivery infrastructure and updating threat models to include SSRF risks will improve long-term resilience.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T19:59:47.373Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b992ba771bdb1749c53e0f
Added to database: 3/17/2026, 5:43:22 PM
Last enriched: 3/17/2026, 5:59:07 PM
Last updated: 3/18/2026, 5:22:27 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.