CVE-2026-27969Path Traversal in Vitess

Severity
9.3CRITICALNVD
EPSS
0.1%
top 79.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 26
Latest updateApr 11

Description

Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the manifest — which may be files that they have also added to the manifest and backup contents — are written to any accessible location on restore. This is a common path traversal security issue. This can be used to provide that attacker with unintended/u

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:L/SC:L/SI:H/SA:H

Affected Packages7 packages

Patches

🔴Vulnerability Details

4
GHSA
aws-mcp has a Command Injection Remote Code Execution Vulnerability2026-04-11
OSV
Vitess users with backup storage access can write to arbitrary file paths in vitess.io/vitess2026-03-10
GHSA
Vitess users with backup storage access can write to arbitrary file paths on restore2026-02-27
OSV
Vitess users with backup storage access can write to arbitrary file paths on restore2026-02-27

📋Vendor Advisories

1
Microsoft
Vitess users with backup storage access can write to arbitrary file paths on restore2026-02-10

🕵️Threat Intelligence

1
Wiz
CVE-2026-27969 Impact, Exploitability, and Mitigation Steps | Wiz