CVE-2026-29185
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to manipulate file paths in a way that could redirect requests to unauthorized API endpoints, potentially exposing sensitive information if they have access to the server-side integration credentials. It requires the attacker to craft specific URLs that exploit the way Backstage processes these paths before version 1.20.1.
Technical Description
Backstage is an open framework for building developer portals. Prior to version 1.20.1, a vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials. This issue has been patched in version 1.20.1.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago