Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r492-hjgh-c9gw | Vitess users with backup storage access can write to arbitrary file paths on restore |
Fri, 27 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation vitess |
|
| CPEs | cpe:2.3:a:linuxfoundation:vitess:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation vitess |
|
| Metrics |
cvssV3_1
|
Fri, 27 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vitessio
Vitessio vitess |
|
| Vendors & Products |
Vitessio
Vitessio vitess |
Thu, 26 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the manifest — which may be files that they have also added to the manifest and backup contents — are written to any accessible location on restore. This is a common path traversal security issue. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. No known workarounds are available. | |
| Title | Vitess users with backup storage access can write to arbitrary file paths on restore | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T19:33:53.738Z
Reserved: 2026-02-25T03:24:57.793Z
Link: CVE-2026-27969
Updated: 2026-02-26T19:33:49.016Z
Status : Analyzed
Published: 2026-02-26T02:16:24.177
Modified: 2026-02-27T18:28:21.607
Link: CVE-2026-27969
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:30:20Z
Github GHSA