Description
Metabase is an open-source data analytics platform. Prior to 55.13, 56.3, and 57.1, self-hosted Metabase instances that allow users to create subscriptions could be potentially impacted if their Metabase is colocated with other unsecured resources. This vulnerability is fixed in 55.13, 56.3, and 57.1.
Published: 2026-01-12
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery enabling access to internal network addresses
Action: Apply Patch
AI Analysis

Impact

Metabase’s channel test endpoint can be used by a client to issue requests to arbitrary internal host addresses. This Server‑Side Request Forgery flaw allows an attacker with access to the endpoint to read data from services that are otherwise isolated behind internal network boundaries, potentially exposing sensitive information. The weakness is classified as CWE-918, indicating improper validation of user‑controlled request data. The CVSS score of 2.1 reflects a low severity but the flaw still exposes internal resources to unauthenticated users if the endpoint is reachable.

Affected Systems

Versions of Metabase older than 55.13, 56.3, and 57.1 are affected. Both the standard and enterprise editions include the vulnerable channel test endpoint. The flaw exists in the open‑source and beta releases of Metabase as well, as suggested by the affected‑CPE data. Updating to any release equal to or newer than 55.13 (for the 55 series), 56.3, or 57.1 removes the vulnerability.

Risk and Exploitability

The CVSS score of 2.1 indicates a low impact; however, the EPSS score of less than 1% suggests the risk of exploitation is very low at the time of this assessment. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Attackers would need to deliver a request to the channel test endpoint, which typically requires network connectivity to the Metabase instance. Because the flaw manifests only when the endpoint is exposed, the risk is further mitigated if the service is behind authentication or network restrictions.

Generated by OpenCVE AI on April 18, 2026 at 06:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Metabase to version 55.13 or later (56.3 or 57.1 for newer series) to remove the channel test endpoint vulnerability.
  • If upgrading immediately is not possible, restrict access to the /api/channel-test endpoint (e.g., require authentication or firewall rules).
  • Implement network segmentation or outbound filtering to prevent Metabase from resolving or connecting to internal IP ranges, thereby limiting the impact of any SSRF attempts.

Generated by OpenCVE AI on April 18, 2026 at 06:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*
cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:metabase:metabase:0.57.0:beta:*:*:-:*:*:*
cpe:2.3:a:metabase:metabase:1.57.0:beta:*:*:enterprise:*:*:*
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Metabase
Metabase metabase
Vendors & Products Metabase
Metabase metabase

Mon, 12 Jan 2026 22:45:00 +0000

Type Values Removed Values Added
Description Metabase is an open-source data analytics platform. Prior to 55.13, 56.3, and 57.1, self-hosted Metabase instances that allow users to create subscriptions could be potentially impacted if their Metabase is colocated with other unsecured resources. This vulnerability is fixed in 55.13, 56.3, and 57.1.
Title Metabase channel test endpoint can reach internal local addresses
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N'}


Subscriptions

Metabase Metabase
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-13T19:07:47.948Z

Reserved: 2026-01-09T22:50:10.287Z

Link: CVE-2026-22805

cve-icon Vulnrichment

Updated: 2026-01-13T14:13:46.643Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-12T23:15:53.217

Modified: 2026-04-10T14:55:49.390

Link: CVE-2026-22805

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:00:11Z

Weaknesses