CVE-2026-42193 PUBLISHED

Plunk: SNS webhook forgery

Assigner: GitHub_M
Reserved: 25.04.2026 Published: 08.05.2026 Updated: 08.05.2026

Plunk is an open-source email platform built on top of AWS SES. Prior to version 0.9.0, the /webhooks/sns endpoint accepts Amazon SNS notification payloads from unauthenticated requests without verifying the SNS signature, certificate, or topic ARN, meaning anyone can forge a valid-looking webhook request. This allows an unauthenticated attacker to spoof SNS events to trigger workflow automations, unsubscribe contacts, manipulate email delivery metrics, and potentially exhaust billing credits. This issue has been patched in version 0.9.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor useplunk
Product plunk
Versions
  • Version < 0.9.0 is affected

References

Problem Types

  • CWE-347: Improper Verification of Cryptographic Signature CWE