Cyber Posture

CVE-2026-26720

CriticalPublic PoC

Published: 02 March 2026

Published
02 March 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0052 66.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

An issue in Twenty CRM v1.15.0 and before allows a remote attacker to execute arbitrary code via the local.driver.ts module.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2026-26720 by requiring timely identification, reporting, and patching of the code injection flaw in Twenty CRM's local.driver.ts module.

prevent

Prevents arbitrary code execution by enforcing validation of untrusted inputs to the vulnerable local.driver.ts module susceptible to CWE-94 code injection.

preventdetect

Boundary protection controls network communications to block or detect remote unauthenticated exploitation payloads targeting the Twenty CRM vulnerability.

Security SummaryAI

CVE-2026-26720 is a critical code injection vulnerability (CWE-94) in Twenty CRM versions v1.15.0 and earlier, enabling remote arbitrary code execution via the local.driver.ts module. Assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it was published on 2026-03-02T16:16:25.517 and affects the open-source CRM software hosted at twenty.com.

A remote attacker requires no authentication, privileges, or user interaction to exploit the vulnerability over the network with low complexity. Successful exploitation allows full arbitrary code execution on the target system, resulting in high impacts to confidentiality, integrity, and availability.

Mitigation details and further analysis are available in referenced resources, including a technical breakdown at https://dillonkirsch.com/post/locally_hosted_twenty_rce_cve_2026_26720/, a GitHub proof-of-concept repository at https://github.com/dillonkirsch/CVE-2026-26720-Twenty-RCE, and the vendor site at https://twenty.com. Security practitioners should review these for patching guidance and exploit details.

Details

CWE(s)

Affected Products

twenty
twenty
≤ 1.15.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote arbitrary code execution in a public-facing CRM web application directly enables T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References