Home

Description

Terrascan v1.18.3 and prior are vulnerable to Server-Side Request Forgery (SSRF) via the webhook_url parameter in the file scan endpoint (POST /v1/{iac}/{iacVersion}/{cloud}/local/file/scan) when running in server mode. An unauthenticated remote attacker can supply an arbitrary URL as the webhook_url multipart form parameter. After scanning the uploaded file, Terrascan sends an HTTP POST request to the attacker-controlled URL containing the full scan results as a JSON body, with the attacker-supplied webhook_token forwarded as a Bearer token in the Authorization header. The retryable HTTP client retries up to 10 times on failure. This affects deployments running terrascan in server mode (terrascan server), which binds to 0.0.0.0 with no authentication. Note: Terrascan was archived in August 2023 and no patch will be released.

PUBLISHED Reserved 2026-05-19 | Published 2026-05-19 | Updated 2026-05-19 | Assigner tenable




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

Server-Side Request Forgery (SSRF)

Product status

Default status
affected

Any version
affected

Credits

Tristan Madani (@TristanInSec) from Talence Security finder

References

github.com/tenable/terrascan (Terrascan GitHub Repository)

cve.org (CVE-2026-47356)

nvd.nist.gov (CVE-2026-47356)

Download JSON