CVE-2026-32096
Published: 11 March 2026
Description
Plunk is an open-source email platform built on top of AWS SES. Prior to 0.7.0, a Server-Side Request Forgery (SSRF) vulnerability existed in the SNS webhook handler. An unauthenticated attacker could send a crafted request that caused the server to…
more
make an arbitrary outbound HTTP GET request to any host accessible from the server. This vulnerability is fixed in 0.7.0.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of the SSRF flaw in the Plunk SNS webhook handler via patching to version 0.7.0 or later.
Mandates validation of unauthenticated inputs to the SNS webhook handler to block crafted requests triggering arbitrary outbound HTTP GET requests.
Enforces boundary protections such as firewalls or proxies to monitor and restrict server outbound connections to unauthorized hosts, mitigating SSRF exploitation.
Security SummaryAI
CVE-2026-32096 is a Server-Side Request Forgery (SSRF) vulnerability, classified under CWE-918, affecting Plunk, an open-source email platform built on AWS SES. The issue resides in the SNS webhook handler in versions prior to 0.7.0. An unauthenticated attacker could send a crafted request that tricks the server into issuing an arbitrary outbound HTTP GET request to any host reachable from the server environment. The vulnerability carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N), reflecting its critical severity due to high confidentiality impact and changed scope.
Any unauthenticated remote attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows the attacker to force the Plunk server to connect to and retrieve data from internal or external hosts that are accessible from the server's network context, such as metadata services, internal APIs, or other cloud resources. While the impact is primarily on confidentiality with limited integrity effects, it enables potential reconnaissance, data exfiltration, or further attacks on pivoted internal systems.
The vulnerability is addressed in Plunk version 0.7.0, as detailed in the project's security advisory (GHSA-xpqg-p8mp-7g44) and the fixing commit (b8f1ad9ab53c78f8ef063fdc125f397c8bfc7652) on GitHub. Security practitioners should upgrade to 0.7.0 or later and review webhook configurations to ensure only trusted sources can trigger SNS handlers.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF vulnerability in unauthenticated public-facing SNS webhook (T1190) allows arbitrary internal/external HTTP requests, enabling network service discovery (T1046), cloud service discovery including metadata services (T1526), and unsecured credential access via cloud instance metadata API (T1552.005).