A vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials.
This affects instances that use any of the SCM integrations (GitHub, Bitbucket Server, Bitbucket Cloud) with the scaffolder or other features that accept user-provided SCM URLs.
This is patched in @backstage/integration version 1.20.1.
There is no workaround for this vulnerability. Users should upgrade to the patched version.
{
"cwe_ids": [
"CWE-22"
],
"severity": "LOW",
"github_reviewed": true,
"nvd_published_at": "2026-03-07T15:15:55Z",
"github_reviewed_at": "2026-03-05T00:20:45Z"
}