Cyber Posture

CVE-2026-22805

High

Published: 12 January 2026

Published
12 January 2026
Modified
10 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0005 14.9th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22805 is a high-severity SSRF (CWE-918) vulnerability in Metabase Metabase. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the SSRF vulnerability by requiring timely patching of Metabase to fixed versions 55.13, 56.3, or 57.1.

prevent

Validates and sanitizes user inputs for subscription features to block malicious URLs that trigger server-side requests.

preventdetect

Monitors and controls outbound communications at system boundaries to protect colocated unsecured resources from SSRF exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF in public-facing Metabase instance directly enables initial access via exploitation of a public-facing application (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Metabase is an open-source data analytics platform. Prior to 55.13, 56.3, and 57.1, self-hosted Metabase instances that allow users to create subscriptions could be potentially impacted if their Metabase is colocated with other unsecured resources. This vulnerability is fixed in…

more

55.13, 56.3, and 57.1.

Deeper analysisAI

CVE-2026-22805 is a vulnerability (CWE-918: Server-Side Request Forgery) affecting Metabase, an open-source data analytics platform. It impacts self-hosted Metabase instances prior to versions 55.13, 56.3, and 57.1 that allow users to create subscriptions, particularly when Metabase is colocated with other unsecured resources. The vulnerability was published on 2026-01-12 and carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).

Remote unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and no user interaction. Exploitation enables high confidentiality impact via a changed scope, potentially allowing access to sensitive data in colocated unsecured resources through server-side requests initiated by subscription features.

The official Metabase security advisory (https://github.com/metabase/metabase/security/advisories/GHSA-2wgg-7r2p-cmqx) confirms the issue is fixed in Metabase versions 55.13, 56.3, and 57.1. Administrators of affected self-hosted instances should upgrade to these versions to mitigate the risk.

Details

CWE(s)

Affected Products

metabase
metabase
0.57.0, 1.57.0 · ≤ 0.55.13 · ≤ 1.55.13 · 0.56.0 — 0.56.3

CVEs Like This One

CVE-2026-27464Same product: Metabase Metabase
CVE-2026-33725Same product: Metabase Metabase
CVE-2026-7025Shared CWE-918
CVE-2025-21385Shared CWE-918
CVE-2025-52362Shared CWE-918
CVE-2026-31317Shared CWE-918
CVE-2026-5016Shared CWE-918
CVE-2026-26338Shared CWE-918
CVE-2025-58045Shared CWE-918
CVE-2025-68030Shared CWE-918

References