CVE-2026-29190
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to read any file on the system running Karapace by providing a specially crafted backup file. It mainly affects setups that use the backup feature and process files from untrusted sources, with the actual risk depending on the permissions of the Karapace application.
Technical Description
Karapace is an open-source implementation of Kafka REST and Schema Registry. Prior to version 6.0.0, there is a Path Traversal vulnerability in the backup reader (backup/backends/v3/backend.py). If a malicious backup file is provided to Karapace, an attacker may exploit insufficient path validation to perform arbitrary file read on the system where Karapace is running. The issue affects deployments that use the backup/restore functionality and process backups from untrusted sources. The impact depends on the file system permissions of the Karapace process. This issue has been patched in version 6.0.0.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 11, 2026
27 days ago
Vendor
aiven
Product
karapace