Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w669-jj7h-88m9

Опубликовано: 02 фев. 2026
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

@backstage/plugin-techdocs-node vulnerable to possible Path Traversal in TechDocs Local Generator

Impact

A path traversal vulnerability in the TechDocs local generator allows attackers to read arbitrary files from the host filesystem when Backstage is configured with techdocs.generator.runIn: local.

When processing documentation from untrusted sources, symlinks within the docs directory are followed by MkDocs during the build process. File contents are embedded into generated HTML and exposed to users who can view the documentation.

Patches

This vulnerability is fixed in @backstage/plugin-techdocs-node version X.X.X. Users should upgrade to this version or later.

Workarounds

  • Switch to runIn: docker in your app-config.yaml:
techdocs: generator: runIn: docker
  • Restrict write access to TechDocs source repositories to trusted users only

References

Пакеты

Наименование

@backstage/plugin-techdocs-node

npm
Затронутые версииВерсия исправления

= 1.14.0

1.14.1

Наименование

@backstage/plugin-techdocs-node

npm
Затронутые версииВерсия исправления

< 1.13.11

1.13.11

EPSS

Процентиль: 15%
0.00048
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 5.3
nvd
7 дней назад

Backstage is an open framework for building developer portals, and @backstage/plugin-techdocs-node provides common node.js functionalities for TechDocs. In versions of @backstage/plugin-techdocs-node prior to 1.13.11 and 1.14.1, a path traversal vulnerability in the TechDocs local generator allows attackers to read arbitrary files from the host filesystem when Backstage is configured with `techdocs.generator.runIn: local`. When processing documentation from untrusted sources, symlinks within the docs directory are followed by MkDocs during the build process. File contents are embedded into generated HTML and exposed to users who can view the documentation. This vulnerability is fixed in` @backstage/plugin-techdocs-node` versions 1.13.11 and 1.14.1. Some workarounds are available. Switch to `runIn: docker` in `app-config.yaml` and/or restrict write access to TechDocs source repositories to trusted users only.

EPSS

Процентиль: 15%
0.00048
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-22