EUVD-2026-11716

| CVE-2026-32301 CRITICAL
9.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None

Lifecycle Timeline

5
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
PoC Detected
Mar 18, 2026 - 18:02 vuln.today
Public exploit code
Analysis Generated
Mar 13, 2026 - 20:00 vuln.today
EUVD ID Assigned
Mar 13, 2026 - 20:00 euvd
EUVD-2026-11716
CVE Published
Mar 13, 2026 - 19:54 nvd
CRITICAL 9.3

Description

Centrifugo is an open-source scalable real-time messaging server. Prior to 6.7.0, Centrifugo is vulnerable to Server-Side Request Forgery (SSRF) when configured with a dynamic JWKS endpoint URL using template variables (e.g. {{tenant}}). An unauthenticated attacker can craft a JWT with a malicious iss or aud claim value that gets interpolated into the JWKS fetch URL before the token signature is verified, causing Centrifugo to make an outbound HTTP request to an attacker-controlled destination. This vulnerability is fixed in 6.7.0.

Analysis

SSRF in Centrifugo real-time messaging before 6.7.0.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all Centrifugo instances in your environment and document their versions and JWKS configurations. Within 7 days: Implement compensating controls (disable dynamic JWKS endpoints if not essential, restrict outbound network access, deploy WAF rules to block malicious JWT claims). …

Sign in for detailed remediation steps.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +46
POC: +20

Share

EUVD-2026-11716 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy