CVE-2026-25534
March 17, 2026
Impact
Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the previous CVE (CVE-2025-61916) through the use of carefully crafted URLs. Note, Spinnaker found this not just in that CVE, but in the existing URL validations in Orca fromUrl expression handling. This CVE impacts BOTH artifacts as a result.
Patches
This has been merged and will be available in versions 2025.4.1, 2025.3.1, 2025.2.4 and 2026.0.0.
Workarounds
You can disable the various artifacts on this system to work around these limits.
Affected Packages
https://github.com/spinnaker/spinnaker.git (GITHUB):
Affected version(s) =orca-2025.3.0 <orca-2025.3.1Fix Suggestion:
Update to version orca-2025.3.1https://github.com/spinnaker/spinnaker.git (GITHUB):
Affected version(s) >=clouddriver-main-2 <clouddriver-main-74Fix Suggestion:
Update to version clouddriver-main-74https://github.com/spinnaker/spinnaker.git (GITHUB):
Affected version(s) >=clouddriver-2025.0-0 <clouddriver-2025.2.4Fix Suggestion:
Update to version clouddriver-2025.2.4https://github.com/spinnaker/spinnaker.git (GITHUB):
Affected version(s) =clouddriver-2025.3-0 <clouddriver-2025.3.1Fix Suggestion:
Update to version clouddriver-2025.3.1https://github.com/spinnaker/spinnaker.git (GITHUB):
Affected version(s) >=orca-2025.0-0 <orca-2025.2.4Fix Suggestion:
Update to version orca-2025.2.4https://github.com/spinnaker/spinnaker.git (GITHUB):
Affected version(s) =orca-2025.4-0 <orca-2025.4.1Fix Suggestion:
Update to version orca-2025.4.1https://github.com/spinnaker/spinnaker.git (GITHUB):
Affected version(s) >=orca-main-1 <orca-main-82Fix Suggestion:
Update to version orca-main-82https://github.com/spinnaker/spinnaker.git (GITHUB):
Affected version(s) =clouddriver-2025.4-0 <clouddriver-2025.4.1Fix Suggestion:
Update to version clouddriver-2025.4.1io.spinnaker.clouddriver:clouddriver-artifacts (JAVA):
Affected version(s) >=main-5 <2025.2.4Fix Suggestion:
Update to version 2025.2.4io.spinnaker.clouddriver:clouddriver-artifacts (JAVA):
Affected version(s) =2025.3.0 <2025.3.1Fix Suggestion:
Update to version 2025.3.1io.spinnaker.orca:orca-core (JAVA):
Affected version(s) >=main-5 <2025.2.4Fix Suggestion:
Update to version 2025.2.4io.spinnaker.orca:orca-core (JAVA):
Affected version(s) =2025.3.0 <2025.3.1Fix Suggestion:
Update to version 2025.3.1Additional Notes
The description of this vulnerability differs from MITRE.
Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.5
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
LOW
Subsequent System Availability
LOW
CVSS v3
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
EPSS
Base Score:
0.05