CVE-2026-27464

High
|7.7
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows a low-privileged user to access sensitive information, such as database credentials, from a Metabase instance by exploiting email template features. It affects certain versions of the software, and users can mitigate the risk by disabling notifications to prevent access to the vulnerable parts of the system.

Technical Description

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via template evaluation. This issue has been fixed in versions 0.57.13 and 0.58.7. To workaround this issue, users can disable notifications in their Metabase instance to disallow access to the vulnerable endpoints.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,474($1K-$5K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Feb 21, 2026

about 2 months ago

Last Modified

Feb 23, 2026

about 2 months ago