Cyber Posture

CVE-2026-32096

Critical

Published: 11 March 2026

Published
11 March 2026
Modified
16 March 2026
KEV Added
Patch
CVSS Score 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
EPSS Score 0.0010 27.3th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Plunk is an open-source email platform built on top of AWS SES. Prior to 0.7.0, a Server-Side Request Forgery (SSRF) vulnerability existed in the SNS webhook handler. An unauthenticated attacker could send a crafted request that caused the server to…

more

make an arbitrary outbound HTTP GET request to any host accessible from the server. This vulnerability is fixed in 0.7.0.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely remediation of the SSRF flaw in the Plunk SNS webhook handler via patching to version 0.7.0 or later.

prevent

Mandates validation of unauthenticated inputs to the SNS webhook handler to block crafted requests triggering arbitrary outbound HTTP GET requests.

prevent

Enforces boundary protections such as firewalls or proxies to monitor and restrict server outbound connections to unauthorized hosts, mitigating SSRF exploitation.

Security SummaryAI

CVE-2026-32096 is a Server-Side Request Forgery (SSRF) vulnerability, classified under CWE-918, affecting Plunk, an open-source email platform built on AWS SES. The issue resides in the SNS webhook handler in versions prior to 0.7.0. An unauthenticated attacker could send a crafted request that tricks the server into issuing an arbitrary outbound HTTP GET request to any host reachable from the server environment. The vulnerability carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N), reflecting its critical severity due to high confidentiality impact and changed scope.

Any unauthenticated remote attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows the attacker to force the Plunk server to connect to and retrieve data from internal or external hosts that are accessible from the server's network context, such as metadata services, internal APIs, or other cloud resources. While the impact is primarily on confidentiality with limited integrity effects, it enables potential reconnaissance, data exfiltration, or further attacks on pivoted internal systems.

The vulnerability is addressed in Plunk version 0.7.0, as detailed in the project's security advisory (GHSA-xpqg-p8mp-7g44) and the fixing commit (b8f1ad9ab53c78f8ef063fdc125f397c8bfc7652) on GitHub. Security practitioners should upgrade to 0.7.0 or later and review webhook configurations to ensure only trusted sources can trigger SNS handlers.

Details

CWE(s)

Affected Products

useplunk
plunk
≤ 0.7.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1526 Cloud Service Discovery Discovery
An adversary may attempt to enumerate the cloud services running on a system after gaining access.
T1552.005 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
Why these techniques?

SSRF vulnerability in unauthenticated public-facing SNS webhook (T1190) allows arbitrary internal/external HTTP requests, enabling network service discovery (T1046), cloud service discovery including metadata services (T1526), and unsecured credential access via cloud instance metadata API (T1552.005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References