CVE-2026-27965: Vitess users with backup storage access can gain unauthorized access to production deployment environments
Any user with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that arbitrary code is later executed when that backup is restored. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there.
References
- github.com/advisories/GHSA-8g8j-r87h-p36x
- github.com/vitessio/vitess
- github.com/vitessio/vitess/commit/4c0173293907af9cb942a6683c465c3f1e9fdb5c
- github.com/vitessio/vitess/issues/19459
- github.com/vitessio/vitess/pull/19460
- github.com/vitessio/vitess/security/advisories/GHSA-8g8j-r87h-p36x
- nvd.nist.gov/vuln/detail/CVE-2026-27965
Code Behaviors & Features
Detect and mitigate CVE-2026-27965 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →