CVE-2026-26720
Twenty CRM · Twenty CRM
Twenty CRM is vulnerable to arbitrary code execution via the local.driver.ts module, allowing a remote attacker to compromise the application server.
Executive summary
Twenty CRM versions v1.15.0 and earlier contain a critical vulnerability in the local.driver.ts module that allows remote attackers to execute arbitrary code.
Vulnerability
The vulnerability resides in the local.driver.ts module, where insufficient input validation allows a remote attacker to inject and execute arbitrary code. This typically occurs through unauthenticated or lowly privileged requests to the driver interface.
Business impact
A successful exploit allows for full application and server compromise, leading to the exposure of sensitive CRM data, including customer contacts and business leads. The CVSS score of 9.8 reflects the critical threat to the confidentiality and integrity of the entire CRM platform.
Remediation
Immediate Action: Update Twenty CRM to the latest patched version immediately to remediate the flaw in the driver module.
Proactive Monitoring: Audit application logs for suspicious file system activities or unauthorized modifications to the local.driver.ts or related TypeScript files.
Compensating Controls: Deploy a Web Application Firewall (WAF) to filter incoming requests for common code injection patterns and restrict file upload/execution capabilities.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Organizations utilizing Twenty CRM should treat this as a critical priority. The ability to execute code remotely through a core module necessitates immediate patching and a thorough review of the application's security configuration.