Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34881: CWE-918 Server-Side Request Forgery (SSRF) in OpenStack Glance

0
Medium
VulnerabilityCVE-2026-34881cvecve-2026-34881cwe-918
Published: Tue Mar 31 2026 (03/31/2026, 05:29:08 UTC)
Source: CVE Database V5
Vendor/Project: OpenStack
Product: Glance

Description

CVE-2026-34881 is a Server-Side Request Forgery (SSRF) vulnerability affecting OpenStack Glance versions prior to 29. 1. 1, versions 30. 0. 0 to before 30. 1. 1, and version 31. 0. 0. An authenticated user can exploit HTTP redirects to bypass URL validation and make requests to internal services via the image import functionality, specifically through the web-download and glance-download methods, as well as the optional ovf_process plugin.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 06:08:56 UTC

Technical Analysis

CVE-2026-34881 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in OpenStack Glance, the image service component of the OpenStack cloud platform. The vulnerability affects versions earlier than 29.1.1, versions from 30.0.0 up to but not including 30.1.1, and version 31.0.0. The flaw arises because the URL validation mechanism in the image import functionality can be bypassed via HTTP redirects. An authenticated attacker can exploit this by submitting specially crafted image import requests using the web-download or glance-download import methods, or the optional ovf_process plugin, which is not enabled by default. By leveraging HTTP redirects, the attacker can cause Glance to send requests to internal services that are otherwise inaccessible, potentially enabling internal network scanning, unauthorized interactions with internal APIs, or further exploitation of internal systems. The vulnerability does not allow direct data exfiltration or denial of service but compromises the integrity of internal network boundaries. Exploitation requires valid user credentials but no additional user interaction. The vulnerability has a CVSS 3.1 base score of 5.0, reflecting medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and scope change. No public exploits have been reported yet, but the presence of this vulnerability in a critical cloud infrastructure component poses a risk to cloud deployments relying on affected OpenStack Glance versions.

Potential Impact

The primary impact of CVE-2026-34881 is the potential for attackers with valid credentials to perform SSRF attacks that bypass URL validation and access internal services within the cloud infrastructure. This can lead to unauthorized internal network reconnaissance, potentially exposing sensitive internal APIs or services that are not intended to be publicly accessible. While the vulnerability does not directly compromise confidentiality or availability, it undermines the integrity of network segmentation and can serve as a pivot point for further attacks, such as privilege escalation or lateral movement within the cloud environment. Organizations running affected OpenStack Glance versions may face increased risk of internal service compromise, data manipulation, or disruption of cloud operations if attackers leverage this SSRF flaw. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with many users or weak credential management. The lack of known exploits in the wild suggests limited immediate threat, but the widespread use of OpenStack in cloud deployments globally means the vulnerability could be targeted in the future.

Mitigation Recommendations

1. Upgrade OpenStack Glance to a fixed version beyond 29.1.1, 30.1.1, or 31.0.0 once patches are available to eliminate the vulnerability. 2. Until patches are applied, disable the vulnerable image import methods (web-download and glance-download) and the optional ovf_process plugin if enabled, to reduce attack surface. 3. Implement strict network segmentation and firewall rules to restrict Glance’s outbound HTTP requests to only trusted endpoints, preventing SSRF exploitation from reaching sensitive internal services. 4. Enforce strong authentication and access controls to limit the number of users who can perform image imports, minimizing the risk of credential abuse. 5. Monitor logs for unusual image import requests or unexpected internal network connections initiated by Glance to detect potential exploitation attempts. 6. Conduct regular security assessments and penetration testing focused on SSRF vectors within cloud infrastructure components. 7. Educate cloud administrators and users about the risks of SSRF and the importance of secure image import practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-31T05:29:07.975Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cb614de6bfc5ba1ddc7ec7

Added to database: 3/31/2026, 5:53:17 AM

Last enriched: 3/31/2026, 6:08:56 AM

Last updated: 3/31/2026, 7:44:04 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses