CVE-2026-27464 PUBLISHED

Metabase: Server-Side Template Injection via Notifications Endpoint Leads to RCE

Assigner: GitHub_M
Reserved: 19.02.2026 Published: 21.02.2026 Updated: 21.02.2026

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via template evaluation. This issue has been fixed in versions 0.57.13 and 0.58.7. To workaround this issue, users can disable notifications in their Metabase instance to disallow access to the vulnerable endpoints.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS Score: 7.7

Product Status

Vendor metabase
Product metabase
Versions
  • Version < 0.57.13 is affected
  • Version >= 0.58.x, < 0.58.7 is affected

References

Problem Types

  • CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE