Description
Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via template evaluation. This issue has been fixed in versions 0.57.13 and 0.58.7. To workaround this issue, users can disable notifications in their Metabase instance to disallow access to the vulnerable endpoints.
Published: 2026-02-21
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch
AI Analysis

Impact

Metabase, an open‑source data analytics platform, contains a server‐side template injection flaw in the notifications endpoint. In affected releases, authenticated users can place arbitrary templated expressions that are evaluated by the server when an email notification is generated. This enables extraction of sensitive data such as database credentials and can lead to remote code execution. The flaw is confirmed in all versions prior to 0.57.13 and in the 0.58.x series up through 0.58.6. A low‑privileged authenticated user can trigger this by requesting the notification endpoint.

Affected Systems

Metabase users running the open‑source edition or the enterprise edition on any version earlier than 0.57.13, or any 0.58.x release before 0.58.7, are affected. Users of 0.57.13, 0.58.7, and later releases are not impacted.

Risk and Exploitability

The CVSS score of 7.7 indicates a high‑severity vulnerability with a potential impact of data exfiltration and remote code execution. The EPSS score of less than 1% implies that exploitation attempts are currently rare, and the vulnerability is not listed in the CISA KEV catalog. Because the attack requires authenticated access, an attacker must first obtain a user account and can then trigger the flaw via the notifications endpoint. Once invoked, the server evaluates the injected template and may expose sensitive information or execute arbitrary code.

Generated by OpenCVE AI on April 17, 2026 at 16:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Metabase 0.57.13 if running an earlier 0.57.x release, or to 0.58.7 if running an earlier 0.58.x release, to apply the vendor‑supplied fix.
  • If an upgrade is not immediately possible, disable notifications in the Metabase instance to prevent access to the vulnerable endpoint.
  • Review any custom notification templates or workflows for intrinsic template expressions and remove or sanitize user input.

Generated by OpenCVE AI on April 17, 2026 at 16:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*
cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*

Wed, 25 Feb 2026 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Metabase
Metabase metabase
Vendors & Products Metabase
Metabase metabase

Sat, 21 Feb 2026 08:15:00 +0000

Type Values Removed Values Added
Description Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via template evaluation. This issue has been fixed in versions 0.57.13 and 0.58.7. To workaround this issue, users can disable notifications in their Metabase instance to disallow access to the vulnerable endpoints.
Title Metabase: Server-Side Template Injection via Notifications Endpoint Leads to RCE
Weaknesses CWE-1336
CWE-94
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Metabase Metabase
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-24T18:51:05.408Z

Reserved: 2026-02-19T17:25:31.101Z

Link: CVE-2026-27464

cve-icon Vulnrichment

Updated: 2026-02-24T18:50:58.716Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T08:16:10.553

Modified: 2026-03-02T15:38:28.610

Link: CVE-2026-27464

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:00:10Z

Weaknesses