CVE-2026-4984

Severity CVSS v4.0:
Pending analysis
Type:
CWE-345 Insufficient Verification of Data Authenticity
Publication date:
27/03/2026
Last modified:
10/05/2026

Description

The Twilio integration webhook handler accepts any POST request without validating Twilio&amp;#39;s &amp;#39;X-Twilio-Signature&amp;#39;.<br /> <br /> When processing media messages, it fetches user-controlled URLs (&amp;#39;MediaUrlN&amp;#39; parameters) using HTTP requests that include the integration&amp;#39;s Twilio credentials in the &amp;#39;Authorization&amp;#39; header.<br /> <br /> An attacker can forge a webhook payload pointing to their own server and receive the victim&amp;#39;s &amp;#39;accountSID&amp;#39; and &amp;#39;authToken&amp;#39; in plaintext (base64-encoded Basic Auth), leading to full compromise of the Twilio account.

References to Advisories, Solutions, and Tools