PT-2026-37221 · Unknown · Twenty-Server
B-Hermes
·
Published
2026-05-05
·
Updated
2026-05-05
·
CVE-2026-33975
CVSS v4.0
8.3
High
| Vector | AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
Twenty versions prior to 1.18.1
Description
An issue in the
SecureHttpClientService of twenty-server allows the bypass of Server-Side Request Forgery (SSRF) protections. This occurs because the Node.js URL parser normalizes IPv4-mapped IPv6 addresses into a compressed hex form, while the isPrivateIp utility only recognizes dotted-decimal notation. Consequently, the hex form bypasses the SSRF check. Furthermore, the socket lookup validation event is not triggered for IP literal addresses, bypassing the second layer of validation. An authenticated user can exploit this to access internal IPs, including cloud metadata endpoints, to exfiltrate credentials such as IAM keys.Recommendations
Update to a version later than 1.18.0.
Fix
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Twenty-Server