LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-4984 - Vulnerability Analysis

HighCVSS: 8.2

Last Updated: March 30, 2026

Twilio Integration - Authentication Bypass

Published: March 27, 2026Updated: March 30, 2026Remote Exploitable

Overview

Twilio integration webhook handler contains an information disclosure caused by lack of validation of 'X-Twilio-Signature' and fetching user-controlled URLs with credentials, letting attackers obtain accountSID and authToken, exploit requires sending forged webhook payload.

Severity & Score

Severity: High
CVSS Score: 8.2
EPSS Score: 3.1%(Probability of exploitation in next 30 days)

Impact

Attackers can obtain Twilio credentials, leading to full account compromise and unauthorized actions.

Mitigation

Validate 'X-Twilio-Signature' on incoming webhook requests and avoid including credentials in requests to user-controlled URLs.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 27, 2026

🟠 CVE-2026-4984 - High (8.2) The Twilio integration webhook handler accepts any POST request without validating Twilio's 'X-Twilio-Signature'. When processing media messages, it fetches user-controlled URLs ('MediaUrlN' parameters) using HTTP requests that include the integr... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-4984/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-4984
Severity
High
CVSS Score
8.2
Type
broken_authentication
Status
unconfirmed
EPSS
3.1%
Social Posts
1

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

EPSS Score

3.1%Probability of exploitation in the next 30 days