Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0298

NIXPKGS-2026-0298
published on 23 Feb 2026
Permalink CVE-2026-27464
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Metabase: Server-Side Template Injection via Notifications Endpoint Leads to RCE

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via template evaluation. This issue has been fixed in versions 0.57.13 and 0.58.7. To workaround this issue, users can disable notifications in their Metabase instance to disallow access to the vulnerable endpoints.

Affected products

metabase
  • ==>= 0.58.x, < 0.58.7
  • ==< 0.57.13

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/metabase/metabase/security/advisories/GHSA-vcj8-rcm8-gfj9