Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. vitess.io/vitess
  4. ›
  5. CVE-2026-27965

CVE-2026-27965: Vitess users with backup storage access can gain unauthorized access to production deployment environments

February 26, 2026

Any user with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that arbitrary code is later executed when that backup is restored. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there.

References

  • github.com/advisories/GHSA-8g8j-r87h-p36x
  • github.com/vitessio/vitess
  • github.com/vitessio/vitess/commit/4c0173293907af9cb942a6683c465c3f1e9fdb5c
  • github.com/vitessio/vitess/issues/19459
  • github.com/vitessio/vitess/pull/19460
  • github.com/vitessio/vitess/security/advisories/GHSA-8g8j-r87h-p36x
  • nvd.nist.gov/vuln/detail/CVE-2026-27965

Code Behaviors & Features

Detect and mitigate CVE-2026-27965 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.23.2

Solution

Unfortunately, there is no solution available yet.

Impact 8.3 HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

go/vitess.io/vitess/CVE-2026-27965.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 27 Feb 2026 12:18:46 +0000.