CVE-2026-27023: CWE-918: Server-Side Request Forgery (SSRF) in twentyhq twenty
Twenty is an open source CRM. Prior to version 1.18, the SSRF protection in SecureHttpClientService validated request URLs at the request level but did not validate redirect targets. An authenticated user who could control outbound request URLs (e.g., webhook endpoints, image URLs) could bypass private IP blocking by redirecting through an attacker-controlled server. This issue has been patched in version 1.18.
AI Analysis
Technical Summary
CVE-2026-27023 is a Server-Side Request Forgery (SSRF) vulnerability identified in the open-source CRM software 'twenty' prior to version 1.18. The root cause lies in the SecureHttpClientService component, which performs validation on outbound request URLs to block access to private IP ranges, a common SSRF mitigation technique. However, this validation does not extend to redirect targets, meaning that if an attacker can control the initial request URL (such as webhook endpoints or image URLs), they can cause the server to follow redirects through an attacker-controlled server. This redirection bypasses the private IP blocking mechanism, allowing the attacker to induce the server to make requests to internal network resources that would otherwise be inaccessible. The vulnerability requires an authenticated user with the ability to specify outbound request URLs, but does not require additional user interaction. The impact is primarily on confidentiality, as it could allow attackers to gather information about internal network services or metadata. The vulnerability has been addressed in version 1.18 of 'twenty' by extending validation to redirect targets, closing the bypass vector. No known exploits are currently reported in the wild. The CVSS 3.1 base score is 5.0, reflecting network attack vector, low attack complexity, required privileges, no user interaction, and limited confidentiality impact without integrity or availability effects.
Potential Impact
The primary impact of CVE-2026-27023 is the potential exposure of internal network information due to SSRF exploitation. An authenticated attacker could leverage this vulnerability to bypass private IP restrictions and access internal services, potentially leading to reconnaissance that precedes more severe attacks such as lateral movement or data exfiltration. Although the vulnerability does not directly compromise data integrity or availability, the information gained could facilitate further exploitation. Organizations using affected versions of 'twenty' risk unauthorized internal network probing, which could expose sensitive infrastructure details or internal APIs. This is particularly concerning for enterprises with critical internal services behind firewalls that rely on SSRF protections to prevent external access. The requirement for authentication limits the attack surface to insiders or compromised user accounts, but the lack of user interaction and low attack complexity increase the risk of exploitation once credentials are obtained.
Mitigation Recommendations
To mitigate CVE-2026-27023, organizations should immediately upgrade 'twenty' CRM to version 1.18 or later, where the SSRF redirect validation flaw is patched. Additionally, administrators should audit and restrict the ability of users to configure outbound request URLs, such as webhook endpoints and image URLs, limiting this capability to trusted users only. Implement network-level controls to restrict outbound HTTP requests from the application server to only necessary external endpoints, reducing the risk of SSRF exploitation. Employ strict allowlists for URLs and domains used in outbound requests and redirects. Monitor application logs for unusual outbound request patterns or redirects that could indicate exploitation attempts. Finally, consider deploying web application firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, India, Japan, Brazil
CVE-2026-27023: CWE-918: Server-Side Request Forgery (SSRF) in twentyhq twenty
Description
Twenty is an open source CRM. Prior to version 1.18, the SSRF protection in SecureHttpClientService validated request URLs at the request level but did not validate redirect targets. An authenticated user who could control outbound request URLs (e.g., webhook endpoints, image URLs) could bypass private IP blocking by redirecting through an attacker-controlled server. This issue has been patched in version 1.18.
AI-Powered Analysis
Technical Analysis
CVE-2026-27023 is a Server-Side Request Forgery (SSRF) vulnerability identified in the open-source CRM software 'twenty' prior to version 1.18. The root cause lies in the SecureHttpClientService component, which performs validation on outbound request URLs to block access to private IP ranges, a common SSRF mitigation technique. However, this validation does not extend to redirect targets, meaning that if an attacker can control the initial request URL (such as webhook endpoints or image URLs), they can cause the server to follow redirects through an attacker-controlled server. This redirection bypasses the private IP blocking mechanism, allowing the attacker to induce the server to make requests to internal network resources that would otherwise be inaccessible. The vulnerability requires an authenticated user with the ability to specify outbound request URLs, but does not require additional user interaction. The impact is primarily on confidentiality, as it could allow attackers to gather information about internal network services or metadata. The vulnerability has been addressed in version 1.18 of 'twenty' by extending validation to redirect targets, closing the bypass vector. No known exploits are currently reported in the wild. The CVSS 3.1 base score is 5.0, reflecting network attack vector, low attack complexity, required privileges, no user interaction, and limited confidentiality impact without integrity or availability effects.
Potential Impact
The primary impact of CVE-2026-27023 is the potential exposure of internal network information due to SSRF exploitation. An authenticated attacker could leverage this vulnerability to bypass private IP restrictions and access internal services, potentially leading to reconnaissance that precedes more severe attacks such as lateral movement or data exfiltration. Although the vulnerability does not directly compromise data integrity or availability, the information gained could facilitate further exploitation. Organizations using affected versions of 'twenty' risk unauthorized internal network probing, which could expose sensitive infrastructure details or internal APIs. This is particularly concerning for enterprises with critical internal services behind firewalls that rely on SSRF protections to prevent external access. The requirement for authentication limits the attack surface to insiders or compromised user accounts, but the lack of user interaction and low attack complexity increase the risk of exploitation once credentials are obtained.
Mitigation Recommendations
To mitigate CVE-2026-27023, organizations should immediately upgrade 'twenty' CRM to version 1.18 or later, where the SSRF redirect validation flaw is patched. Additionally, administrators should audit and restrict the ability of users to configure outbound request URLs, such as webhook endpoints and image URLs, limiting this capability to trusted users only. Implement network-level controls to restrict outbound HTTP requests from the application server to only necessary external endpoints, reducing the risk of SSRF exploitation. Employ strict allowlists for URLs and domains used in outbound requests and redirects. Monitor application logs for unusual outbound request patterns or redirects that could indicate exploitation attempts. Finally, consider deploying web application firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-17T03:08:23.490Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a9c996460e1c85df139358
Added to database: 3/5/2026, 6:21:10 PM
Last enriched: 3/5/2026, 6:36:21 PM
Last updated: 3/5/2026, 9:07:40 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.