CVE-2026-27969
February 26, 2026
Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the manifest — which may be files that they have also added to the manifest and backup contents — are written to any accessible location on restore. This is a common path traversal security issue. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. No known workarounds are available.
Affected Packages
https://github.com/vitessio/vitess.git (GITHUB):
Affected version(s) >=v22.0.0 <v22.0.4Fix Suggestion:
Update to version v22.0.4https://github.com/vitessio/vitess.git (GITHUB):
Affected version(s) >=v23.0.0 <v23.0.3Fix Suggestion:
Update to version v23.0.3https://github.com/vitessio/vitess.git (GITHUB):
Affected version(s) >=v0.23.0 <v0.23.3Fix Suggestion:
Update to version v0.23.3https://github.com/vitessio/vitess.git (GITHUB):
Affected version(s) >=v0.22.0 <v0.22.4Fix Suggestion:
Update to version v0.22.4vitess.io/vitess (GO):
Affected version(s) >=v0.23.0-rc1 <v0.23.3Fix Suggestion:
Update to version v0.23.3vitess.io/vitess (GO):
Affected version(s) >=v0.22.0 <v0.22.4Fix Suggestion:
Update to version v0.22.4Related Resources (6)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
PASSIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
LOW
Subsequent System Confidentiality
LOW
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
8.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
LOW
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
EPSS
Base Score:
0.06