CVE-2026-29185

Low
|2.7
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to manipulate file paths in a way that could redirect requests to unauthorized API endpoints, potentially exposing sensitive information if they have access to the server-side integration credentials. It requires the attacker to craft specific URLs that exploit the way Backstage processes these paths before version 1.20.1.

Technical Description

Backstage is an open framework for building developer portals. Prior to version 1.20.1, a vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials. This issue has been patched in version 1.20.1.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactLow
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$374($100-$500)
Vendor Response
Grade APatched in 1 day

Quick Information

Published

Mar 7, 2026

about 1 month ago

Last Modified

Mar 9, 2026

29 days ago