{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T00:15:50.462","vulnerabilities":[{"cve":{"id":"CVE-2026-27464","sourceIdentifier":"security-advisories@github.com","published":"2026-02-21T08:16:10.553","lastModified":"2026-03-02T15:38:28.610","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via template evaluation. This issue has been fixed in versions 0.57.13 and 0.58.7. To workaround this issue, users can disable notifications in their Metabase instance to disallow access to the vulnerable endpoints."},{"lang":"es","value":"Metabase es una plataforma de análisis de datos de código abierto. En versiones anteriores a la 0.57.13 y versiones 0.58.x hasta la 0.58.6, los usuarios autenticados pueden recuperar información sensible de una instancia de Metabase, incluyendo credenciales de acceso a la base de datos. Durante las pruebas, se confirmó que un usuario con pocos privilegios puede extraer información sensible, incluyendo credenciales de la base de datos, en el cuerpo del correo electrónico a través de la evaluación de plantillas. Este problema ha sido solucionado en las versiones 0.57.13 y 0.58.7. Como solución alternativa a este problema, los usuarios pueden deshabilitar las notificaciones en su instancia de Metabase para denegar el acceso a los puntos finales vulnerables."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-94"},{"lang":"en","value":"CWE-1336"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*","versionEndExcluding":"0.57.13","matchCriteriaId":"01D97E57-7925-4413-A3E7-2CEF3B301E79"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"1.57.13","matchCriteriaId":"E7E8C780-8CAD-4580-A760-BD988DC448F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*","versionStartIncluding":"0.58.0","versionEndExcluding":"0.58.7","matchCriteriaId":"BDDF3090-38D4-469F-8C63-C33E682F104E"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.58.0","versionEndExcluding":"1.58.7","matchCriteriaId":"1F98F32C-2D07-48F7-9E19-751695665BBD"}]}]}],"references":[{"url":"https://github.com/metabase/metabase/releases/tag/v0.57.13","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/metabase/metabase/releases/tag/v0.58.7","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/metabase/metabase/security/advisories/GHSA-vcj8-rcm8-gfj9","source":"security-advisories@github.com","tags":["Vendor Advisory","Patch"]}]}}]}