CVE-2026-22805
Published: 12 January 2026
Summary
CVE-2026-22805 is a high-severity SSRF (CWE-918) vulnerability in Metabase Metabase. Its CVSS base score is 8.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the SSRF vulnerability by requiring timely patching of Metabase to fixed versions 55.13, 56.3, or 57.1.
Validates and sanitizes user inputs for subscription features to block malicious URLs that trigger server-side requests.
Monitors and controls outbound communications at system boundaries to protect colocated unsecured resources from SSRF exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in public-facing Metabase instance directly enables initial access via exploitation of a public-facing application (T1190).
NVD Description
Metabase is an open-source data analytics platform. Prior to 55.13, 56.3, and 57.1, self-hosted Metabase instances that allow users to create subscriptions could be potentially impacted if their Metabase is colocated with other unsecured resources. This vulnerability is fixed in…
more
55.13, 56.3, and 57.1.
Deeper analysisAI
CVE-2026-22805 is a vulnerability (CWE-918: Server-Side Request Forgery) affecting Metabase, an open-source data analytics platform. It impacts self-hosted Metabase instances prior to versions 55.13, 56.3, and 57.1 that allow users to create subscriptions, particularly when Metabase is colocated with other unsecured resources. The vulnerability was published on 2026-01-12 and carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
Remote unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and no user interaction. Exploitation enables high confidentiality impact via a changed scope, potentially allowing access to sensitive data in colocated unsecured resources through server-side requests initiated by subscription features.
The official Metabase security advisory (https://github.com/metabase/metabase/security/advisories/GHSA-2wgg-7r2p-cmqx) confirms the issue is fixed in Metabase versions 55.13, 56.3, and 57.1. Administrators of affected self-hosted instances should upgrade to these versions to mitigate the risk.
Details
- CWE(s)