CVE-2026-27969

Source
https://cve.org/CVERecord?id=CVE-2026-27969
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27969.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27969
Aliases
Published
2026-02-26T01:52:30.677Z
Modified
2026-03-03T02:56:59.833240Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:L/SC:L/SI:H/SA:H CVSS Calculator
Summary
Vitess users with backup storage access can write to arbitrary file paths on restore
Details

Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the manifest — which may be files that they have also added to the manifest and backup contents — are written to any accessible location on restore. This is a common path traversal security issue. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. No known workarounds are available.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27969.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Git / github.com/vitessio/vitess

Affected ranges

Type
GIT
Repo
https://github.com/vitessio/vitess
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "22.0.4"
        }
    ]
}
Type
GIT
Repo
https://github.com/vitessio/vitess
Events
Database specific
{
    "versions": [
        {
            "introduced": "23.0.0"
        },
        {
            "fixed": "23.0.3"
        }
    ]
}

Affected versions

v0.*
v0.10.0
v0.10.2
v0.22.0
v0.22.0-rc1
v0.22.0-rc2
v0.22.0-rc3
v0.22.1
v0.22.2
v0.22.3
v0.23.0
v0.23.1
v0.23.2
v0.8.0
v0.9.0
v0.9.1
v10.*
v10.0.0
v10.0.0-rc1
v10.0.0-rc1-mysql80
v10.0.1
v10.0.2
v11.*
v11.0.0-rc1
v2.*
v2.0.0-alpha1
v2.0.0-alpha2
v2.0.0-alpha3
v2.0.0-alpha4
v2.0.0-alpha5
v2.0.0-beta.1
v2.0.0-beta.2
v2.0.0-rc.1
v2.0.0-rc.2
v2.1.0-alpha.1
v2.2
v2.2-alpha
v2.2.0-rc.1
v22.*
v22.0.0
v22.0.0-rc1
v22.0.0-rc2
v22.0.0-rc3
v22.0.1
v22.0.2
v22.0.3
v23.*
v23.0.0
v23.0.1
v23.0.2
v3.*
v3.0
v3.0.0-rc.1
v3.0.0-rc.2
v3.0.0-rc.3
v5.*
v5.0.0
v5.0.1
v6.*
v6.0.0-rc.1
v7.*
v7.0.0-beta
v8.*
v8.0.0
v8.0.0-rc1
v8.0.0-test
v9.*
v9.0.0
v9.0.0-rc1
v9.0.1
v9.0.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27969.json"