CVE-2026-29186
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to run any Python code on a server using the Backstage platform, potentially taking full control of the system. It occurs when the attacker can create a specially crafted configuration file for documentation that bypasses security checks, and it has been fixed in the latest version.
Technical Description
Backstage is an open framework for building developer portals. Prior to version 1.14.3, this is a configuration bypass vulnerability that enables arbitrary code execution. The @backstage/plugin-techdocs-node package uses an allowlist to filter dangerous MkDocs configuration keys during the documentation build process. A gap in this allowlist allows attackers to craft an mkdocs.yml that causes arbitrary Python code execution, completely bypassing TechDocs' security controls. This issue has been patched in version 1.14.3.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 11, 2026
27 days ago
Vendor
linuxfoundation
Product
backstage plugin-techdocs-node
Related Vulnerabilities
This vulnerability allows an attacker to remotely crash the modem, causing a denial of service without needing any special permissions. It occurs due to improper checks on the input data sent to the modem.
This vulnerability allows an attacker with physical access to a device to read unique identifiers that could reveal sensitive information about the device. No special permissions or user actions are needed to exploit this flaw, making it a significant risk for devices that may be left unattended.