CVE-2026-34881: CWE-918 Server-Side Request Forgery (SSRF) in OpenStack Glance
CVE-2026-34881 is a Server-Side Request Forgery (SSRF) vulnerability affecting OpenStack Glance versions prior to 29. 1. 1, versions 30. 0. 0 to before 30. 1. 1, and version 31. 0. 0. An authenticated user can exploit HTTP redirects to bypass URL validation and make requests to internal services via the image import functionality, specifically through the web-download and glance-download methods, as well as the optional ovf_process plugin.
AI Analysis
Technical Summary
CVE-2026-34881 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in OpenStack Glance, the image service component of the OpenStack cloud platform. The vulnerability affects versions earlier than 29.1.1, versions from 30.0.0 up to but not including 30.1.1, and version 31.0.0. The flaw arises because the URL validation mechanism in the image import functionality can be bypassed via HTTP redirects. An authenticated attacker can exploit this by submitting specially crafted image import requests using the web-download or glance-download import methods, or the optional ovf_process plugin, which is not enabled by default. By leveraging HTTP redirects, the attacker can cause Glance to send requests to internal services that are otherwise inaccessible, potentially enabling internal network scanning, unauthorized interactions with internal APIs, or further exploitation of internal systems. The vulnerability does not allow direct data exfiltration or denial of service but compromises the integrity of internal network boundaries. Exploitation requires valid user credentials but no additional user interaction. The vulnerability has a CVSS 3.1 base score of 5.0, reflecting medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and scope change. No public exploits have been reported yet, but the presence of this vulnerability in a critical cloud infrastructure component poses a risk to cloud deployments relying on affected OpenStack Glance versions.
Potential Impact
The primary impact of CVE-2026-34881 is the potential for attackers with valid credentials to perform SSRF attacks that bypass URL validation and access internal services within the cloud infrastructure. This can lead to unauthorized internal network reconnaissance, potentially exposing sensitive internal APIs or services that are not intended to be publicly accessible. While the vulnerability does not directly compromise confidentiality or availability, it undermines the integrity of network segmentation and can serve as a pivot point for further attacks, such as privilege escalation or lateral movement within the cloud environment. Organizations running affected OpenStack Glance versions may face increased risk of internal service compromise, data manipulation, or disruption of cloud operations if attackers leverage this SSRF flaw. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with many users or weak credential management. The lack of known exploits in the wild suggests limited immediate threat, but the widespread use of OpenStack in cloud deployments globally means the vulnerability could be targeted in the future.
Mitigation Recommendations
1. Upgrade OpenStack Glance to a fixed version beyond 29.1.1, 30.1.1, or 31.0.0 once patches are available to eliminate the vulnerability. 2. Until patches are applied, disable the vulnerable image import methods (web-download and glance-download) and the optional ovf_process plugin if enabled, to reduce attack surface. 3. Implement strict network segmentation and firewall rules to restrict Glance’s outbound HTTP requests to only trusted endpoints, preventing SSRF exploitation from reaching sensitive internal services. 4. Enforce strong authentication and access controls to limit the number of users who can perform image imports, minimizing the risk of credential abuse. 5. Monitor logs for unusual image import requests or unexpected internal network connections initiated by Glance to detect potential exploitation attempts. 6. Conduct regular security assessments and penetration testing focused on SSRF vectors within cloud infrastructure components. 7. Educate cloud administrators and users about the risks of SSRF and the importance of secure image import practices.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, India, Australia, Netherlands, Brazil
CVE-2026-34881: CWE-918 Server-Side Request Forgery (SSRF) in OpenStack Glance
Description
CVE-2026-34881 is a Server-Side Request Forgery (SSRF) vulnerability affecting OpenStack Glance versions prior to 29. 1. 1, versions 30. 0. 0 to before 30. 1. 1, and version 31. 0. 0. An authenticated user can exploit HTTP redirects to bypass URL validation and make requests to internal services via the image import functionality, specifically through the web-download and glance-download methods, as well as the optional ovf_process plugin.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34881 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in OpenStack Glance, the image service component of the OpenStack cloud platform. The vulnerability affects versions earlier than 29.1.1, versions from 30.0.0 up to but not including 30.1.1, and version 31.0.0. The flaw arises because the URL validation mechanism in the image import functionality can be bypassed via HTTP redirects. An authenticated attacker can exploit this by submitting specially crafted image import requests using the web-download or glance-download import methods, or the optional ovf_process plugin, which is not enabled by default. By leveraging HTTP redirects, the attacker can cause Glance to send requests to internal services that are otherwise inaccessible, potentially enabling internal network scanning, unauthorized interactions with internal APIs, or further exploitation of internal systems. The vulnerability does not allow direct data exfiltration or denial of service but compromises the integrity of internal network boundaries. Exploitation requires valid user credentials but no additional user interaction. The vulnerability has a CVSS 3.1 base score of 5.0, reflecting medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and scope change. No public exploits have been reported yet, but the presence of this vulnerability in a critical cloud infrastructure component poses a risk to cloud deployments relying on affected OpenStack Glance versions.
Potential Impact
The primary impact of CVE-2026-34881 is the potential for attackers with valid credentials to perform SSRF attacks that bypass URL validation and access internal services within the cloud infrastructure. This can lead to unauthorized internal network reconnaissance, potentially exposing sensitive internal APIs or services that are not intended to be publicly accessible. While the vulnerability does not directly compromise confidentiality or availability, it undermines the integrity of network segmentation and can serve as a pivot point for further attacks, such as privilege escalation or lateral movement within the cloud environment. Organizations running affected OpenStack Glance versions may face increased risk of internal service compromise, data manipulation, or disruption of cloud operations if attackers leverage this SSRF flaw. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with many users or weak credential management. The lack of known exploits in the wild suggests limited immediate threat, but the widespread use of OpenStack in cloud deployments globally means the vulnerability could be targeted in the future.
Mitigation Recommendations
1. Upgrade OpenStack Glance to a fixed version beyond 29.1.1, 30.1.1, or 31.0.0 once patches are available to eliminate the vulnerability. 2. Until patches are applied, disable the vulnerable image import methods (web-download and glance-download) and the optional ovf_process plugin if enabled, to reduce attack surface. 3. Implement strict network segmentation and firewall rules to restrict Glance’s outbound HTTP requests to only trusted endpoints, preventing SSRF exploitation from reaching sensitive internal services. 4. Enforce strong authentication and access controls to limit the number of users who can perform image imports, minimizing the risk of credential abuse. 5. Monitor logs for unusual image import requests or unexpected internal network connections initiated by Glance to detect potential exploitation attempts. 6. Conduct regular security assessments and penetration testing focused on SSRF vectors within cloud infrastructure components. 7. Educate cloud administrators and users about the risks of SSRF and the importance of secure image import practices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-03-31T05:29:07.975Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cb614de6bfc5ba1ddc7ec7
Added to database: 3/31/2026, 5:53:17 AM
Last enriched: 3/31/2026, 6:08:56 AM
Last updated: 3/31/2026, 7:44:04 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.