Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-27464
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-21 Feb, 2026 | 07:57
Updated At-24 Feb, 2026 | 18:51
Rejected At-
▼CVE Numbering Authority (CNA)
Metabase: Server-Side Template Injection via Notifications Endpoint Leads to RCE

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via template evaluation. This issue has been fixed in versions 0.57.13 and 0.58.7. To workaround this issue, users can disable notifications in their Metabase instance to disallow access to the vulnerable endpoints.

Affected Products
Vendor
metabase
Product
metabase
Versions
Affected
  • < 0.57.13
  • >= 0.58.x, < 0.58.7
Problem Types
TypeCWE IDDescription
CWECWE-1336CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine
CWECWE-94CWE-94: Improper Control of Generation of Code ('Code Injection')
Type: CWE
CWE ID: CWE-1336
Description: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine
Type: CWE
CWE ID: CWE-94
Description: CWE-94: Improper Control of Generation of Code ('Code Injection')
Metrics
VersionBase scoreBase severityVector
3.17.7HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/metabase/metabase/security/advisories/GHSA-vcj8-rcm8-gfj9
x_refsource_CONFIRM
https://github.com/metabase/metabase/releases/tag/v0.57.13
x_refsource_MISC
https://github.com/metabase/metabase/releases/tag/v0.58.7
x_refsource_MISC
Hyperlink: https://github.com/metabase/metabase/security/advisories/GHSA-vcj8-rcm8-gfj9
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/metabase/metabase/releases/tag/v0.57.13
Resource:
x_refsource_MISC
Hyperlink: https://github.com/metabase/metabase/releases/tag/v0.58.7
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found