Home

Description

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via template evaluation. This issue has been fixed in versions 0.57.13 and 0.58.7. To workaround this issue, users can disable notifications in their Metabase instance to disallow access to the vulnerable endpoints.

PUBLISHED Reserved 2026-02-19 | Published 2026-02-21 | Updated 2026-02-24 | Assigner GitHub_M




HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 0.57.13
affected

>= 0.58.x, < 0.58.7
affected

References

github.com/...tabase/security/advisories/GHSA-vcj8-rcm8-gfj9

github.com/metabase/metabase/releases/tag/v0.57.13

github.com/metabase/metabase/releases/tag/v0.58.7

cve.org (CVE-2026-27464)

nvd.nist.gov (CVE-2026-27464)

Download JSON