Vulnerability Description
The Twilio integration webhook handler accepts any POST request without validating Twilio's 'X-Twilio-Signature'. When processing media messages, it fetches user-controlled URLs ('MediaUrlN' parameters) using HTTP requests that include the integration's Twilio credentials in the 'Authorization' header. An attacker can forge a webhook payload pointing to their own server and receive the victim's 'accountSID' and 'authToken' in plaintext (base64-encoded Basic Auth), leading to full compromise of the Twilio account.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-4984?
CVE-2026-4984 is a vulnerability with a CVSS score of 8.2 (HIGH). The Twilio integration webhook handler accepts any POST request without validating Twilio's 'X-Twilio-Signature'. When processing media messages, it fetches user-controlled URLs ('MediaUrlN' paramete...
How severe is CVE-2026-4984?
CVE-2026-4984 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-4984?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.