Twenty is an open source CRM. Prior to version 1.18, the SSRF protection in SecureHttpClientService validated request URLs at the request level but did not validate redirect targets. An authenticated user who could control outbound request URLs (e.g., webhook endpoints, image URLs) could bypass private IP blocking by redirecting through an attacker-controlled server. This issue has been patched in version 1.18.
References
| Link | Resource |
|---|---|
| https://github.com/twentyhq/twenty/releases/tag/v1.18.0 | Product Release Notes |
| https://github.com/twentyhq/twenty/security/advisories/GHSA-wm7q-rvq3-x8q9 | Mitigation Vendor Advisory |
Configurations
History
10 Mar 2026, 18:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/twentyhq/twenty/releases/tag/v1.18.0 - Product, Release Notes | |
| References | () https://github.com/twentyhq/twenty/security/advisories/GHSA-wm7q-rvq3-x8q9 - Mitigation, Vendor Advisory | |
| CPE | cpe:2.3:a:twenty:twenty:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| First Time |
Twenty
Twenty twenty |
05 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 19:16
Updated : 2026-03-10 18:25
NVD link : CVE-2026-27023
Mitre link : CVE-2026-27023
CVE.ORG link : CVE-2026-27023
JSON object : View
Products Affected
twenty
- twenty
CWE
CWE-918
Server-Side Request Forgery (SSRF)
