Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. io.spinnaker.clouddriver/clouddriver-artifacts
  4. ›
  5. CVE-2025-61916

CVE-2025-61916: Spinnaker vulnerable to SSRF due to improper restrictions on http from user input

January 5, 2026 (updated January 6, 2026)

The primary impact is allowing users to fetch data from a remote URL. This data can be then injected into Spinnaker pipelines via helm or other methods to extract things LIKE idmsv1 authentication data. This ALSO includes calling INTERNAL Spinnaker API’s via a get and similar endpoints. Further, depending upon the artifact configuration, auth data may be exposed to arbitrary endpoints (e.g. GitHub auth headers) leading to credentials exposure.

To trigger this, a Spinnaker installation MUST have:

  • An artifact enabled that allows user input. This includes GitHub file artifacts, BitBucket, GitLab, HTTP artifacts and similar artifact providers. JUST enabling the http artifact provider will add a “no-auth” http provider that could be used to extract link local data (e.g. AWS Metadata information).
  • A system that can consume the output of these artifacts. E.g. Rosco helm can use this to fetch values data. K8s account manifests if the API returns JSON can be used to inject that data into the pipeline itself though the pipeline would fail.

To note, due to the way the URLs are viable to be injected, CERTAIN systems can be used to provide DOS attacks on Spinnaker itself. These would NOT compromise the system per se, given restarts and timeout configuration, but could lead to internal attacks by a Spinnaker user against Spinnaker services. An example is that an artifact fetch reference could return an infinite response data feed or similar that can act as a DOS attack. It’s recommended to set strong limits on the various http limits AND artifact URLs to known valid URLs.

References

  • github.com/advisories/GHSA-vrjc-q2fh-6x9h
  • github.com/spinnaker/spinnaker
  • github.com/spinnaker/spinnaker/security/advisories/GHSA-vrjc-q2fh-6x9h
  • nvd.nist.gov/vuln/detail/CVE-2025-61916

Code Behaviors & Features

Detect and mitigate CVE-2025-61916 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2025.1.6, all versions starting from 2025.2.0 before 2025.2.3

Fixed versions

  • 2025.1.6
  • 2025.2.3

Solution

Upgrade to versions 2025.1.6, 2025.2.3 or above.

Impact 7.9 HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation
  • CWE-523: Unprotected Transport of Credentials
  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

maven/io.spinnaker.clouddriver/clouddriver-artifacts/CVE-2025-61916.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:36:35 +0000.