The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-22726

CVE-2026-22726: Cloudfoundry Cf-deployment SSRF Vulnerability

CVE-2026-22726 is a server-side request forgery vulnerability in Cloudfoundry Cf-deployment that enables malicious developers to bypass egress rules and access internal networks. This article covers the exploit mechanism, affected versions, and upgrade paths.

Published: May 7, 2026

CVE-2026-22726 Overview

CVE-2026-22726 is a firewall bypass vulnerability in Cloud Foundry that abuses Route Services to redirect application traffic outside of configured egress rules. A malicious developer with access to Cloud Foundry can configure a route-service that forwards requests to HTTP services on internal networks reachable by the Gorouter. These internal destinations may not have direct exposure from outside networks or from the application itself, enabling lateral access to restricted services.

The issue affects the Cloud Foundry routing_release from v0.118.0 through v0.371.0 (inclusive) and cf-deployment from v0.0.2 through v54.14.0 (inclusive). The flaw is tracked under CWE-923 (Improper Restriction of Communication Channel to Intended Endpoints).

Critical Impact

An authenticated developer can reach internal HTTP services through the Gorouter, bypassing application security group egress controls and exposing services that should remain isolated.

Affected Products

  • Cloud Foundry routing_release versions v0.118.0 through v0.371.0
  • Cloud Foundry cf-deployment versions v0.0.2 through v54.14.0
  • Deployments using Gorouter with Route Services enabled

Discovery Timeline

  • 2026-05-01 - CVE-2026-22726 published to NVD
  • 2026-05-04 - Last updated in NVD database

Technical Details for CVE-2026-22726

Vulnerability Analysis

Cloud Foundry Route Services let operators and developers bind external or internal services that intercept and process requests before they reach an application. The Gorouter forwards inbound traffic to the configured route-service URL, which then proxies the request back to the original destination. This trust model assumes the route-service URL is constrained by the same egress policies that govern application traffic.

In affected versions, the Gorouter does not enforce application security groups (ASGs) or egress rules when dispatching to a route-service destination. A developer with permission to register route-services can supply a URL pointing to internal HTTP endpoints. The Gorouter then issues the request from its own network position, which typically has broader reachability than tenant applications.

The outcome is a confused-deputy scenario. The Gorouter performs the network call on behalf of the developer-controlled configuration, granting access to internal management interfaces, metadata services, or other infrastructure components that ASGs were intended to block.

Root Cause

The root cause is improper restriction of the communication channel exposed through Route Services. The routing layer treats route-service URLs as trusted endpoints and skips the egress validation applied to direct application traffic. This mismatch between the security model for app-originated traffic and route-service-originated traffic produces the bypass.

Attack Vector

Exploitation requires authenticated access to a Cloud Foundry environment with permission to create or bind route-services. The attacker registers a user-provided route-service whose URL targets an internal HTTP service reachable by the Gorouter. Subsequent requests routed through the bound application cause the Gorouter to issue traffic to the attacker-specified internal URL. No user interaction is needed beyond the initial configuration, and the attack is performed entirely over the network.

The vulnerability mechanism is described in the Cloud Foundry security advisory. No public proof-of-concept exploit is currently available.

Detection Methods for CVE-2026-22726

Indicators of Compromise

  • Route-service registrations referencing internal IP ranges, loopback addresses, or non-public hostnames in the configured URL.
  • Gorouter access logs showing outbound requests to internal subnets that do not align with documented service endpoints.
  • Unexpected user-provided service instances of type route-service created by developer accounts.

Detection Strategies

  • Audit Cloud Foundry CAPI for all route-service bindings and inspect the route_service_url field for destinations outside approved egress ranges.
  • Correlate Gorouter request logs with ASG policy to identify traffic patterns that should have been blocked by egress rules but were issued by the router.
  • Review CF audit events for audit.service_instance.create and audit.service_binding.create entries tied to route-services.

Monitoring Recommendations

  • Forward Gorouter access logs and CAPI audit events to a centralized analytics platform for continuous review.
  • Alert on route-service URLs containing private RFC1918 ranges, link-local addresses, or internal DNS suffixes.
  • Track the routing_release and cf-deployment versions in use across foundations to confirm patch coverage.

How to Mitigate CVE-2026-22726

Immediate Actions Required

  • Upgrade routing_release to v0.372.0 or later, which contains the egress enforcement fix.
  • Upgrade cf-deployment to v55.0.0 or later, which bundles the patched routing release.
  • Inventory existing route-service bindings and remove any that target internal-only destinations not explicitly authorized.

Patch Information

Cloud Foundry has released fixed versions. Operators should deploy routing_releasev0.372.0 or newer, or upgrade the entire foundation to cf-deploymentv55.0.0 or newer. Refer to the Cloud Foundry advisory for upgrade procedures and verification steps.

Workarounds

  • Restrict the developer roles that can create user-provided service instances of type route-service until the patch is deployed.
  • Place network-level controls between the Gorouter and sensitive internal HTTP services to deny unsolicited traffic.
  • Monitor and review all newly registered route-service URLs against an allowlist of approved external destinations.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSSRF

  • Vendor/TechCloudfoundry

  • SeverityMEDIUM

  • CVSS Score5.0

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-923
  • Vendor Resources
  • Cloud Foundry Blog Post
  • Related CVEs
  • CVE-2026-22723: Cloudfoundry UAA Auth Bypass Vulnerability

  • CVE-2025-22246: Cloud Foundry UAA Information Disclosure
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English