Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @backstage/integration
  4. ›
  5. CVE-2026-29185

CVE-2026-29185: Backstage vulnerable to potential reading of SCM URLs using built in token

March 5, 2026 (updated March 9, 2026)

A vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials.

This affects instances that use any of the SCM integrations (GitHub, Bitbucket Server, Bitbucket Cloud) with the scaffolder or other features that accept user-provided SCM URLs.

References

  • github.com/advisories/GHSA-95v5-prp4-5gv5
  • github.com/backstage/backstage
  • github.com/backstage/backstage/security/advisories/GHSA-95v5-prp4-5gv5
  • nvd.nist.gov/vuln/detail/CVE-2026-29185

Code Behaviors & Features

Detect and mitigate CVE-2026-29185 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.20.1

Fixed versions

  • 1.20.1

Solution

Upgrade to version 1.20.1 or above.

Impact 2.7 LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

npm/@backstage/integration/CVE-2026-29185.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 17 Apr 2026 00:17:51 +0000.