CVE-2026-32096

Plunk · Plunk

Plunk contains an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in its SNS webhook handler, allowing attackers to make arbitrary outbound GET requests.

Executive summary

An unauthenticated SSRF vulnerability in Plunk allows attackers to probe internal network resources and potentially exfiltrate sensitive cloud metadata.

Vulnerability

A flaw in the Amazon Simple Notification Service (SNS) webhook handler allows an unauthenticated attacker to send crafted requests. This forces the server to initiate arbitrary outbound HTTP GET requests to any host, including internal services or cloud metadata endpoints (e.g., IMDS).

Business impact

A successful SSRF attack can lead to the compromise of internal services not exposed to the internet and the theft of sensitive environment variables or cloud IAM credentials. The CVSS score of 9.3 highlights the significant risk to the confidentiality and security of the underlying AWS infrastructure.

Remediation

Immediate Action: Update the Plunk platform to version 0.7.0 or higher immediately.

Proactive Monitoring: Monitor outbound network logs for unusual GET requests originating from the Plunk server, particularly those targeting internal IP ranges or the 169.254.169.254 metadata address.

Compensating Controls: Implement egress filtering to restrict the Plunk server's ability to communicate with internal network segments or sensitive cloud metadata services.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The ability for an unauthenticated attacker to trigger outbound requests is a high-risk scenario. Administrators must apply the version 0.7.0 patch immediately and verify that the server's network permissions follow the principle of least privilege.