Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

530+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-26135: Azure Custom Locations SSRF Enables Privilege Escalation (CVSS 9.6)
CVE-2026-26135: Azure Custom Locations SSRF Enables Privilege Escalation (CVSS 9.6)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-26135

CVE-2026-26135: Azure Custom Locations SSRF Enables Privilege Escalation (CVSS 9.6)

A critical server-side request forgery vulnerability in Azure Custom Locations Resource Provider allows an authorized attacker to elevate privileges over the network, potentially gaining access to internal Azure infrastructure.

Dylan H.

Security Team

April 3, 2026
6 min read

Affected Products

  • Azure Custom Locations Resource Provider

Executive Summary

Microsoft has disclosed CVE-2026-26135, a critical-severity server-side request forgery (SSRF) vulnerability in the Azure Custom Locations Resource Provider (RP) with a CVSS score of 9.6. The flaw allows an authorized attacker to perform privilege escalation over the network, potentially enabling lateral movement within Azure infrastructure or access to internal services.

Azure Custom Locations is an Azure Arc feature that allows administrators to map Azure resource types to custom on-premises or edge compute locations. A vulnerability in its Resource Provider backend could allow an attacker with existing Azure credentials to escalate their privileges by forging server-side requests to internal Azure infrastructure.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-26135
CVSS Score9.6 (Critical)
TypeServer-Side Request Forgery (SSRF)
ComponentAzure Custom Locations Resource Provider
Attack VectorNetwork
Privileges RequiredLow (authorized attacker)
User InteractionNone
ScopeChanged
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
Patch AvailableYes — managed by Microsoft
PublishedApril 3, 2026

Affected Components

ComponentDescription
Azure Custom Locations Resource ProviderAzure Arc extension enabling custom on-prem/edge resource mapping
Azure Arc-enabled Kubernetes clustersAny Arc-connected cluster using Custom Locations

Custom Locations is a globally available Azure service managed by Microsoft. Unlike self-hosted software, the patch is deployed by Microsoft directly — customers do not need to apply updates manually to the service itself, but should audit any associated resources.


Technical Background

What Is Azure Custom Locations?

Azure Custom Locations is part of the Azure Arc platform. It enables organizations to:

  • Create custom Azure resource types that map to on-premises or edge infrastructure
  • Use Azure Resource Manager APIs to deploy and manage resources outside of Azure datacenters
  • Extend Azure services (like App Service, Data Services) to arbitrary compute environments

The Custom Locations Resource Provider is the Azure-side service that handles API requests for these custom resources.

SSRF in a Resource Provider Context

An SSRF vulnerability in an Azure Resource Provider is particularly severe because:

  1. Azure's internal network contains privileged metadata endpoints, management APIs, and inter-service communication channels that are not exposed publicly
  2. A forged request made by the Azure RP backend can reach internal Azure infrastructure on behalf of the attacker — bypassing network perimeter controls
  3. Privilege escalation becomes possible when SSRF allows access to internal token issuance services, management plane APIs, or identity endpoints that can be used to acquire elevated credentials

The attacker must already hold some level of Azure authorization (e.g., contributor or reader role on a subscription with Arc resources), but can use the SSRF to escalate beyond their authorized scope.


Impact Assessment

Impact AreaDescription
Privilege EscalationAttacker can gain access beyond their authorized Azure role
Internal Service AccessSSRF may reach Azure internal metadata endpoints or management APIs
Cross-Tenant RiskIn shared Azure infrastructure, SSRF could potentially affect resources in other tenants
Arc-Connected ResourcesOn-premises resources connected via Azure Arc may be accessible via escalated privileges
Credential TheftInternal token endpoints accessible via SSRF could yield higher-privilege tokens

Who Is Affected?

Organizations using Azure Arc with Custom Locations are potentially affected, particularly those that:

  • Have Arc-connected Kubernetes clusters with Custom Locations enabled
  • Grant contributor or operator-level access to users or service principals
  • Use Custom Locations to host Azure App Service, Azure Functions, or Azure Data Services on Arc clusters

Organizations that do not use Azure Arc Custom Locations are not directly impacted.


Remediation

As this is a managed Azure service, Microsoft is responsible for patching the vulnerability on the server side. However, customers should take the following actions:

1. Review Azure Arc Custom Locations Permissions

# List all Custom Locations in your subscription
az customlocation list --output table
 
# Review role assignments on Custom Location resources
az role assignment list --scope /subscriptions/<sub-id> --output table | grep customLocation

2. Audit Access to Azure Arc Resources

# List all Arc-connected clusters
az connectedk8s list --output table
 
# Review service principal access
az ad sp list --filter "displayName eq 'your-arc-sp'" --output json

3. Apply Principle of Least Privilege

Ensure that no user or service principal has more Azure RBAC access than needed for their role. Specifically:

  • Restrict Custom Locations Contributor and Owner roles to only those who require it
  • Use Azure Policy to enforce least-privilege access on Arc resources
  • Enable Azure Defender for Containers and Azure Defender for Servers on Arc-connected machines

4. Monitor for Suspicious Activity

# Review Azure Activity Log for unusual Custom Locations API calls
az monitor activity-log list \
  --resource-type "Microsoft.ExtendedLocation/customLocations" \
  --start-time 2026-03-01 \
  --output table

Enable Microsoft Sentinel or Microsoft Defender for Cloud alerts for anomalous Azure Resource Manager API activity.


Detection Indicators

IndicatorDescription
Unexpected Custom Locations API callsCalls to /providers/Microsoft.ExtendedLocation/customLocations from unexpected principals
Unusual role assignments on Arc resourcesNew role assignments on Custom Locations or Arc clusters
Anomalous cross-resource API activityAPI calls touching resources the principal should not have access to
Azure Defender alerts on Arc resourcesLateral movement or privilege escalation alerts from Defender for Cloud

Remediation Checklist

  1. Monitor Azure Activity Logs for suspicious Custom Locations API calls
  2. Audit all role assignments on Azure Arc and Custom Locations resources
  3. Restrict Custom Locations roles to required personnel only
  4. Enable Microsoft Defender for Cloud on all Arc-connected resources
  5. Review service principal permissions associated with Arc clusters
  6. Watch for Microsoft's service-side patch notification and apply any customer-facing mitigations they recommend
  7. Assess whether any connected on-premises resources could be reached via escalated Azure privileges

References

  • NVD — CVE-2026-26135
  • Microsoft Security Response Center
  • Azure Custom Locations Documentation
  • OWASP — Server-Side Request Forgery (SSRF)
  • CWE-918 — Server-Side Request Forgery (SSRF)
#CVE-2026-26135#Azure#SSRF#Privilege Escalation#Cloud Security#Microsoft#NVD

Related Articles

CVE-2026-32987: OpenClaw Bootstrap Code Replay Enables Privilege Escalation to operator.admin

A critical CVSS 9.8 vulnerability in OpenClaw allows attackers to replay a valid bootstrap setup code multiple times before approval, escalating device pairing scopes up to operator.admin privilege level.

5 min read

CVE-2026-5016: elecV2P SSRF Vulnerability in URL Handler Allows Remote Attack

A server-side request forgery vulnerability in elecV2P up to version 3.8.3 allows remote attackers to manipulate the eAxios function via the /mock endpoint's req argument. A public exploit is available.

5 min read

CVE-2025-12886: Oxygen Theme SSRF Allows Unauthenticated Web Requests

A Server-Side Request Forgery vulnerability in the Oxygen Theme plugin for WordPress (all versions up to 6.0.8) enables unauthenticated attackers to make...

6 min read
Back to all Security Alerts