CVE-2026-34881

| EUVD-2026-17323 MEDIUM
2026-03-31 mitre
5.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 31, 2026 - 06:00 vuln.today
EUVD ID Assigned
Mar 31, 2026 - 06:00 euvd
EUVD-2026-17323
CVE Published
Mar 31, 2026 - 05:29 nvd
MEDIUM 5.0

Tags

Description

OpenStack Glance <29.1.1, >=30.0.0 <30.1.1, ==31.0.0 is affected by Server-Side Request Forgery (SSRF). By use of HTTP redirects, an authenticated user can bypass URL validation checks and redirect to internal services. Only glance image import functionality is affected. In particular, the web-download and glance-download import methods are subject to this vulnerability, as is the optional (not enabled by default) ovf_process image import plugin.

Analysis

Server-Side Request Forgery in OpenStack Glance image import allows authenticated users to bypass URL validation via HTTP redirects and reach internal services. Affected versions include Glance prior to 29.1.1, 30.0.0 through 30.1.0, and 31.0.0. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

25
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +25
POC: 0

Vendor Status

Debian

Bug #1131274
glance
Release Status Fixed Version Urgency
bullseye vulnerable 2:21.0.0-2+deb11u1 -
bullseye (security) vulnerable 2:21.1.0-1+deb11u2 -
bookworm, bookworm (security) vulnerable 2:25.1.0-2+deb12u1 -
trixie vulnerable 2:30.0.0-3 -
forky, sid fixed 2:32.0.0~rc2-2 -
(unstable) fixed 2:31.0.0-3 -

Share

CVE-2026-34881 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy