Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31959: CWE-918: Server-Side Request Forgery (SSRF) in anchore quill

0
Medium
VulnerabilityCVE-2026-31959cvecve-2026-31959cwe-918
Published: Wed Mar 11 2026 (03/11/2026, 19:30:46 UTC)
Source: CVE Database V5
Vendor/Project: anchore
Product: quill

Description

CVE-2026-31959 is a Server-Side Request Forgery (SSRF) vulnerability in Anchore's Quill tool prior to version 0. 7. 1. Quill fetches Apple notarization submission logs by following URLs provided in Apple's API responses without validating the URL scheme or host address. An attacker capable of tampering with these API responses—possible in environments with TLS interception, compromised CAs, or trust boundary violations—can supply arbitrary URLs, causing Quill to make HTTP(S) requests to attacker-controlled or internal network resources. This may lead to exfiltration of sensitive data such as cloud credentials or internal service information. Both the Quill CLI and library are affected. The vulnerability has a CVSS score of 5. 3 (medium severity) and requires network-level manipulation of API responses, which is non-trivial under normal conditions. The issue is fixed in Quill version 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:18:03 UTC

Technical Analysis

Anchore's Quill is a tool designed to simplify macOS binary signing and notarization from any platform. Versions prior to 0.7.1 contain an SSRF vulnerability (CWE-918) that arises during the retrieval of Apple notarization submission logs. Specifically, Quill fetches URLs provided in Apple's notarization API responses without validating the URL scheme (e.g., enforcing HTTPS) or restricting the host to prevent local or multicast IP addresses. This lack of validation allows an attacker who can intercept or modify the API response to supply arbitrary URLs. When Quill follows these URLs, it can be coerced into making HTTP or HTTPS requests to attacker-controlled endpoints or internal network services. Exploitation requires the attacker to be able to tamper with Apple's notarization API responses, which is generally prevented by HTTPS with proper TLS certificate validation. However, environments employing TLS-intercepting proxies (common in corporate networks), compromised certificate authorities, or other trust boundary violations are vulnerable. The impact includes potential exfiltration of sensitive data such as cloud provider credentials or internal service responses accessible from the Quill client environment. Both the Quill CLI and library are affected, broadening the attack surface. The vulnerability was assigned CVE-2026-31959 and has a CVSS v3.1 score of 5.3, indicating medium severity. No known exploits in the wild have been reported. The issue is resolved in Quill version 0.7.1.

Potential Impact

This SSRF vulnerability can lead to unauthorized internal network scanning and data exfiltration from systems running vulnerable versions of Quill. Organizations using Quill for macOS notarization in environments with TLS interception or compromised trust stores are at risk of attackers leveraging this flaw to access sensitive internal resources or credentials. The impact is primarily confidentiality loss, as attackers may retrieve sensitive data from internal services or cloud credentials. Integrity and availability impacts are minimal or not directly indicated. Because exploitation requires the ability to modify API responses, the attack complexity is high, limiting widespread exploitation under normal network conditions. However, in corporate or high-security environments where TLS interception proxies are common, the risk is elevated. The vulnerability affects both CLI users and automated systems using the Quill library, potentially impacting CI/CD pipelines and automated notarization workflows. Organizations relying on Quill for notarization processes may face operational risks if sensitive internal resources are exposed or credentials are compromised.

Mitigation Recommendations

Upgrade all instances of Anchore Quill to version 0.7.1 or later, where this SSRF vulnerability is fixed. For environments where upgrading is not immediately possible, implement network-level controls to restrict outbound HTTP/HTTPS requests from systems running Quill to only trusted endpoints, preventing arbitrary URL access. Review and harden TLS interception proxies to ensure they do not improperly intercept or modify Apple's notarization API traffic. Validate and monitor certificate authorities in use to detect any compromise or unauthorized certificates. Employ network segmentation to limit access from notarization clients to sensitive internal resources. Additionally, consider implementing application-layer URL validation or sandboxing around Quill's network requests if custom modifications are feasible. Monitor logs for unusual outbound requests from Quill clients that could indicate exploitation attempts. Finally, educate security teams about the risk of SSRF in notarization tooling and incorporate this vulnerability into threat modeling and incident response plans.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T15:40:10.481Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1c6312f860ef9436c35f0

Added to database: 3/11/2026, 7:44:49 PM

Last enriched: 3/19/2026, 2:18:03 AM

Last updated: 4/26/2026, 3:25:00 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses