NIXPKGS-2026-0298
GitHub issue
published on 23 Feb 2026
Permalink
CVE-2026-27464
7.7 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
Metabase: Server-Side Template Injection via Notifications Endpoint Leads to RCE
Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via template evaluation. This issue has been fixed in versions 0.57.13 and 0.58.7. To workaround this issue, users can disable notifications in their Metabase instance to disallow access to the vulnerable endpoints.
References
- https://github.com/metabase/metabase/security/advisories/GHSA-vcj8-rcm8-gfj9 x_refsource_CONFIRM
- https://github.com/metabase/metabase/releases/tag/v0.57.13 x_refsource_MISC
- https://github.com/metabase/metabase/releases/tag/v0.58.7 x_refsource_MISC
Affected products
metabase
- ==>= 0.58.x, < 0.58.7
- ==< 0.57.13
Matching in nixpkgs
Package maintainers
-
@thoughtpolice Austin Seipp <aseipp@pobox.com>
-
@mmahut Marek Mahut <marek.mahut@gmail.com>
-
@schneefux schneefux <schneefux+nixos_pkg@schneefux.xyz>