When TechDocs is configured with runIn: local, a malicious actor who can submit or modify a repository's mkdocs.yml file can execute arbitrary Python code on the TechDocs build server via MkDocs hooks configuration.
Upgrade to @backstage/plugin-techdocs-node version 1.13.11, 1.14.1 or later.
The fix introduces an allowlist of supported MkDocs configuration keys. Unsupported configuration keys (including hooks) are now removed from mkdocs.yml before running the generator, with a warning logged to indicate which keys were removed.
Note: Users of @techdocs/cli should also upgrade to the latest version, which includes the fixed @backstage/plugin-techdocs-node dependency.
If you cannot upgrade immediately:
runIn: docker instead of runIn: local. This provides container isolation, though it does not fully mitigate the risk.mkdocs.yml files in repositories that TechDocs processes. Only allow trusted contributors.mkdocs.yml files to detect malicious hooks configurations before they are merged.Note: Building documentation in CI/CD pipelines using @techdocs/cli does not mitigate this vulnerability, as the CLI uses the same vulnerable @backstage/plugin-techdocs-node package.
MkDocs Hooks Documentation MkDocs 1.4 Release Notes TechDocs Architecture
{
"nvd_published_at": "2026-01-30T22:15:56Z",
"cwe_ids": [
"CWE-94"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2026-02-02T20:19:58Z"
}