CVE-2026-32236
March 12, 2026
Backstage is an open framework for building developer portals. Prior to 0.27.1, a Server-Side Request Forgery (SSRF) vulnerability exists in @backstage/plugin-auth-backend when auth.experimentalClientIdMetadataDocuments.enabled is set to true. The CIMD
metadata fetch validates the initial client_id hostname against private IP ranges but does not apply the same validation after HTTP redirects. The practical impact is limited. The attacker cannot read the response body from the internal request, cannot control request headers or method, and the feature must be explicitly enabled via an experimental flag that is off by default. Deployments that restrict allowedClientIdPatterns to specific trusted domains are not affected. Patched in @backstage/plugin-auth-backend version 0.27.1.
Affected Packages
https://github.com/backstage/backstage.git (GITHUB):
Affected version(s) >=v0.1.0 <v1.48.5Fix Suggestion:
Update to version v1.48.5@backstage/plugin-auth-backend (NPM):
Affected version(s) >=0.0.0-nightly-2020972106 <0.27.1Fix Suggestion:
Update to version 0.27.1Related Resources (4)
Do you need more information?
Contact UsWeakness Type (CWE)
Server-Side Request Forgery (SSRF)
EPSS
Base Score:
0.04