Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27023: CWE-918: Server-Side Request Forgery (SSRF) in twentyhq twenty

0
Medium
VulnerabilityCVE-2026-27023cvecve-2026-27023cwe-918
Published: Thu Mar 05 2026 (03/05/2026, 16:23:31 UTC)
Source: CVE Database V5
Vendor/Project: twentyhq
Product: twenty

Description

Twenty is an open source CRM. Prior to version 1.18, the SSRF protection in SecureHttpClientService validated request URLs at the request level but did not validate redirect targets. An authenticated user who could control outbound request URLs (e.g., webhook endpoints, image URLs) could bypass private IP blocking by redirecting through an attacker-controlled server. This issue has been patched in version 1.18.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 20:28:27 UTC

Technical Analysis

CVE-2026-27023 is a Server-Side Request Forgery (SSRF) vulnerability identified in the open-source Customer Relationship Management (CRM) software 'twenty' by twentyhq. The vulnerability exists in versions prior to 1.18 within the SecureHttpClientService component, which is responsible for handling outbound HTTP requests. While the service performs validation on the initial request URLs to block access to private IP ranges, it does not validate the URLs of HTTP redirects. This oversight allows an authenticated attacker who can control outbound request URLs—such as webhook endpoints or image URLs—to bypass private IP blocking by crafting requests that redirect through an attacker-controlled server. This redirection effectively enables the attacker to probe or interact with internal network resources that should otherwise be inaccessible, potentially exposing sensitive internal services or data. The vulnerability requires the attacker to have authenticated access to the application but does not require additional user interaction. The flaw does not impact the integrity or availability of the system but can lead to limited confidentiality breaches by exposing internal network information. The issue was publicly disclosed on March 5, 2026, and has been addressed in version 1.18 of the software. The CVSS v3.1 base score is 5.0, indicating a medium severity level, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and a scope change due to the redirection mechanism. No known exploits are reported in the wild at this time.

Potential Impact

The primary impact of this SSRF vulnerability is the potential exposure of internal network resources that are normally protected by private IP blocking. An authenticated attacker could leverage this flaw to access internal services, potentially gathering sensitive information or mapping internal network topology. While the vulnerability does not directly allow code execution, data modification, or denial of service, the confidentiality breach could facilitate further attacks or lateral movement within an organization's network. Organizations using the affected versions of the twenty CRM may face increased risk of internal reconnaissance by malicious insiders or compromised accounts. The medium severity reflects the moderate risk, given the need for authentication and the limited scope of impact. However, in environments where internal services are highly sensitive or where the CRM is integrated with critical infrastructure, the consequences could be more severe. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade the twenty CRM software to version 1.18 or later, where the SSRF protection has been enhanced to validate redirect targets properly. Until the upgrade can be applied, administrators should restrict authenticated user permissions to limit who can configure or control outbound request URLs such as webhook endpoints or image URLs. Network-level controls can be implemented to restrict outbound HTTP requests from the CRM server to only trusted destinations, minimizing the risk of SSRF exploitation. Monitoring and logging outbound requests and redirects can help detect suspicious activity indicative of SSRF attempts. Additionally, employing web application firewalls (WAFs) with SSRF detection rules may provide an additional layer of defense. Regular security reviews of user permissions and configurations related to outbound requests are recommended to reduce the attack surface. Finally, educating users about the risks of SSRF and maintaining up-to-date software versions are critical best practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T03:08:23.490Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a9c996460e1c85df139358

Added to database: 3/5/2026, 6:21:10 PM

Last enriched: 3/12/2026, 8:28:27 PM

Last updated: 4/19/2026, 11:16:05 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses