CVE-2026-24048
January 21, 2026
Backstage is an open framework for building developer portals, and @backstage/backend-defaults provides the default implementations and setup for a standard Backstage backend app. Prior to versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0, the "FetchUrlReader" component, used by the catalog and other plugins to fetch content from URLs, followed HTTP redirects automatically. This allowed an attacker who controls a host listed in "backend.reading.allow" to redirect requests to internal or sensitive URLs that are not on the allowlist, bypassing the URL allowlist security control. This is a Server-Side Request Forgery (SSRF) vulnerability that could allow access to internal resources, but it does not allow attackers to include additional request headers. This vulnerability is fixed in "@backstage/backend-defaults" version 0.12.2, 0.13.2, 0.14.1, and 0.15.0. Users should upgrade to this version or later. Some workarounds are available. Restrict "backend.reading.allow" to only trusted hosts that you control and that do not issue redirects, ensure allowed hosts do not have open redirect vulnerabilities, and/or use network-level controls to block access from Backstage to sensitive internal endpoints.
Affected Packages
https://github.com/backstage/backstage.git (GITHUB):
Affected version(s) >=v1.47.0-next.0 <v1.47.0Fix Suggestion:
Update to version v1.47.0https://github.com/backstage/backstage.git (GITHUB):
Affected version(s) >=v1.46.0-next.0 <v1.46.4Fix Suggestion:
Update to version v1.46.4https://github.com/backstage/backstage.git (GITHUB):
Affected version(s) >=v1.43.0-next.0 <v1.43.4Fix Suggestion:
Update to version v1.43.4https://github.com/backstage/backstage.git (GITHUB):
Affected version(s) >=v1.45.0-next.0 <v1.45.4Fix Suggestion:
Update to version v1.45.4@backstage/backend-defaults (NPM):
Affected version(s) >=0.0.0-nightly-20220811024336 <0.12.2Fix Suggestion:
Update to version 0.12.2@backstage/backend-defaults (NPM):
Affected version(s) >=0.14.0 <0.14.1Fix Suggestion:
Update to version 0.14.1@backstage/backend-defaults (NPM):
Affected version(s) >=0.13.0 <0.13.2Fix Suggestion:
Update to version 0.13.2Related ResourcesĀ (4)
Do you need more information?
Contact UsCVSS v4
Base Score:
2.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
LOW
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
3.5
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
EPSS
Base Score:
0.03