Description
Centrifugo is an open-source scalable real-time messaging server. Prior to 6.7.0, Centrifugo is vulnerable to Server-Side Request Forgery (SSRF) when configured with a dynamic JWKS endpoint URL using template variables (e.g. {{tenant}}). An unauthenticated attacker can craft a JWT with a malicious iss or aud claim value that gets interpolated into the JWKS fetch URL before the token signature is verified, causing Centrifugo to make an outbound HTTP request to an attacker-controlled destination. This vulnerability is fixed in 6.7.0.
Published: 2026-03-12
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

Centrifugo is an open‑source real‑time messaging server that, prior to version 6.7.0, has a vulnerability allowing an unauthenticated attacker to trigger Server‑Side Request Forgery (SSRF). By injecting a malicious issuer (iss) or audience (aud) claim into a JWT, the attacker can cause the server to interpolate that claim into a dynamically configured JWKS endpoint URL before the token signature is verified. Consequently, Centrifugo will fetch the JWKS from an attacker‑controlled URL, resulting in arbitrary outbound HTTP requests from the server.

Affected Systems

The vulnerability affects all Centrifugo installations from the vendor centrifugal that are running a version earlier than 6.7.0. Product identification is provided via the CPE string: cpe:2.3:a:centrifugal:centrifugo:*:*:*:*:*:*:*:*.

Risk and Exploitability

The flaw has a CVSS score of 9.3, categorized as critical. An EPSS score of less than 1% indicates low reported exploitation activity, and the vulnerability is not listed in the CISA KEV catalog. Attack can be performed without authentication and requires only outbound network connectivity from the affected server to an attacker‑controlled destination. The combination of high impact and low exploitability suggests that the risk is significant but may be mitigated by timely patching.

Generated by OpenCVE AI on March 18, 2026 at 20:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Centrifugo to version 6.7.0 or later

Generated by OpenCVE AI on March 18, 2026 at 20:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j77h-rr39-c552 Centrifugo: SSRF via unverified JWT claims interpolated into dynamic JWKS endpoint URL
History

Wed, 18 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:centrifugal:centrifugo:*:*:*:*:*:*:*:*

Fri, 13 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Centrifugal
Centrifugal centrifugo
Vendors & Products Centrifugal
Centrifugal centrifugo

Thu, 12 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description Centrifugo is an open-source scalable real-time messaging server. Prior to 6.7.0, Centrifugo is vulnerable to Server-Side Request Forgery (SSRF) when configured with a dynamic JWKS endpoint URL using template variables (e.g. {{tenant}}). An unauthenticated attacker can craft a JWT with a malicious iss or aud claim value that gets interpolated into the JWKS fetch URL before the token signature is verified, causing Centrifugo to make an outbound HTTP request to an attacker-controlled destination. This vulnerability is fixed in 6.7.0.
Title Centrifugo: SSRF via unverified JWT claims interpolated into dynamic JWKS endpoint URL
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N'}


Subscriptions

Centrifugal Centrifugo
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T13:09:57.376Z

Reserved: 2026-03-11T21:16:21.658Z

Link: CVE-2026-32301

cve-icon Vulnrichment

Updated: 2026-03-13T13:09:53.246Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:41.477

Modified: 2026-03-18T18:02:29.327

Link: CVE-2026-32301

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T10:00:21Z

Weaknesses