CVE-2026-24047
January 21, 2026
Backstage is an open framework for building developer portals, and @backstage/cli-common provides config loading functionality used by the backend and command line interface of Backstage. Prior to version 0.1.17, the "resolveSafeChildPath" utility function in "@backstage/backend-plugin-api", which is used to prevent path traversal attacks, failed to properly validate symlink chains and dangling symlinks. An attacker could bypass the path validation via symlink chains (creating "link1 → link2 → /outside" where intermediate symlinks eventually resolve outside the allowed directory) and dangling symlinks (creating symlinks pointing to non-existent paths outside the base directory, which would later be created during file operations). This function is used by Scaffolder actions and other backend components to ensure file operations stay within designated directories. This vulnerability is fixed in "@backstage/backend-plugin-api" version 0.1.17. Users should upgrade to this version or later. Some workarounds are available. Run Backstage in a containerized environment with limited filesystem access and/or restrict template creation to trusted users.
Affected Packages
https://github.com/backstage/backstage.git (GITHUB):
Affected version(s) >=v1.45.0-next.0 <v1.45.4Fix Suggestion:
Update to version v1.45.4https://github.com/backstage/backstage.git (GITHUB):
Affected version(s) >=v1.47.0-next.0 <v1.47.0Fix Suggestion:
Update to version v1.47.0https://github.com/backstage/backstage.git (GITHUB):
Affected version(s) >=v1.46.0-next.0 <v1.46.4Fix Suggestion:
Update to version v1.46.4https://github.com/backstage/backstage.git (GITHUB):
Affected version(s) >=v1.43.0-next.0 <v1.43.4Fix Suggestion:
Update to version v1.43.4@backstage/cli-common (NPM):
Affected version(s) >=0.0.0-nightly-2021612205 <0.1.17Fix Suggestion:
Update to version 0.1.17@backstage/backend-plugin-api (NPM):
Affected version(s) >=1.0.0 <1.6.1Fix Suggestion:
Update to version 1.6.1Related Resources (4)
Do you need more information?
Contact UsCVSS v4
Base Score:
7
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
EPSS
Base Score:
0.02