CVE-2026-27023

Twenty is an open source CRM. Prior to version 1.18, the SSRF protection in SecureHttpClientService validated request URLs at the request level but did not validate redirect targets. An authenticated user who could control outbound request URLs (e.g., webhook endpoints, image URLs) could bypass private IP blocking by redirecting through an attacker-controlled server. This issue has been patched in version 1.18.
Configurations

Configuration 1 (hide)

cpe:2.3:a:twenty:twenty:*:*:*:*:*:*:*:*

History

10 Mar 2026, 18:25

Type Values Removed Values Added
References () https://github.com/twentyhq/twenty/releases/tag/v1.18.0 - () https://github.com/twentyhq/twenty/releases/tag/v1.18.0 - Product, Release Notes
References () https://github.com/twentyhq/twenty/security/advisories/GHSA-wm7q-rvq3-x8q9 - () https://github.com/twentyhq/twenty/security/advisories/GHSA-wm7q-rvq3-x8q9 - Mitigation, Vendor Advisory
CPE cpe:2.3:a:twenty:twenty:*:*:*:*:*:*:*:*
Summary
  • (es) Twenty es un CRM de código abierto. Antes de la versión 1.18, la protección SSRF en SecureHttpClientService validaba las URL de solicitud a nivel de solicitud, pero no validaba los objetivos de redirección. Un usuario autenticado que podía controlar las URL de solicitud salientes (por ejemplo, puntos finales de webhook, URL de imagen) podía eludir el bloqueo de IP privadas redirigiendo a través de un servidor controlado por un atacante. Este problema ha sido parcheado en la versión 1.18.
First Time Twenty
Twenty twenty

05 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 19:16

Updated : 2026-03-10 18:25


NVD link : CVE-2026-27023

Mitre link : CVE-2026-27023

CVE.ORG link : CVE-2026-27023


JSON object : View

Products Affected

twenty

  • twenty
CWE
CWE-918

Server-Side Request Forgery (SSRF)