Ad

CVE-2026-25534

CRITICAL CVSS 3.1: 9.1
Updated Mar 17, 2026
Io.Spinnaker.Clouddriver
Parameter Value
CVSS 9.1 (CRITICAL)
Type CWE-918 (Server-Side Request Forgery (SSRF))
Vendor Io.Spinnaker.Clouddriver
Public PoC No

### Impact Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the previous CVE (CVE-2025-61916) through the use of carefully crafted URLs.

Note, Spinnaker found this not just in that CVE, but in the existing URL validations in Orca fromUrl expression handling. This CVE impacts BOTH artifacts as a result. ### Patches This has been merged and will be available in versions 2025.4.1, 2025.3.1, 2025.2.4 and 2026.0.0. ### Workarounds You can disable the various artifacts on this system to work around these limits.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
Low
Partial data modification
Availability
Low
Partial disruption

CVSS Vector v3.1

Vulnerable Products

io.spinnaker.clouddriver:clouddriver-artifacts io.spinnaker.orca:orca-core