CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-61916
7.9

Spinnaker Adrift: Sinking the Cloud with SSRF in Clouddriver

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 6, 2026·5 min read·3 visits

PoC Available

Executive Summary (TL;DR)

Spinnaker's Clouddriver service blindly fetches URLs defined in pipeline artifacts. Attackers can define a malicious HTTP artifact pointing to `169.254.169.254` (AWS Metadata), trigger a pipeline, and exfiltrate the returned IAM credentials via the pipeline's execution logs or baked manifests.

A critical Server-Side Request Forgery (SSRF) vulnerability in Spinnaker's Clouddriver component allows authenticated users to trick the platform into fetching arbitrary internal URLs. By exploiting artifact providers, attackers can pivot through the deployment server to steal cloud metadata credentials or map internal networks.

Official Patches

SpinnakerOfficial GitHub Security Advisory

Technical Appendix

CVSS Score
7.9/ 10
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L

Affected Systems

Spinnaker Clouddriver MicroserviceSpinnaker Rosco (indirectly as consumer)Kubernetes Deployments using Spinnaker

Affected Versions Detail

Product
Affected Versions
Fixed Version
Spinnaker
Spinnaker
< 2025.1.62025.1.6
Spinnaker
Spinnaker
2025.2.0 - 2025.2.22025.2.3
clouddriver
Spinnaker
< 2025.0.92025.0.9
AttributeDetail
CWE IDCWE-918 (SSRF)
CVSS v3.17.9 (High)
Attack VectorLocal / Authenticated UI
ImpactCredential Theft / Internal Recon
StatusPatched
ExploitabilityHigh (Trivial PoC)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1552.005Cloud Instance Metadata API
Credential Access
T1213Data from Information Repositories
Collection
CWE-918
Server-Side Request Forgery (SSRF)

Server-Side Request Forgery (SSRF) occurs when a web application is fetching a remote resource without validating the user-supplied URL. It allows an attacker to coerce the application to send a crafted request to an unexpected destination, often bypassing firewalls.

Known Exploits & Detection

SpeculativeStandard SSRF techniques against AWS IMDSv1 work out-of-the-box via the HTTP artifact provider.

Vulnerability Timeline

CVE Published
2026-01-05
Patched versions released
2026-01-05

References & Sources

  • [1]GHSA-vrjc-q2fh-6x9h
  • [2]NVD Record

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.