Description
Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the manifest — which may be files that they have also added to the manifest and backup contents — are written to any accessible location on restore. This is a common path traversal security issue. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. No known workarounds are available.
Published: 2026-02-26
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker who can read and write to the backup storage location to modify backup manifest files. During a restore operation, this manipulation causes the system to write files to any path accessible to the process, essentially a classic path traversal problem (CWE‑22). The attacker can overwrite configuration files, create or replace executable scripts, or otherwise place malicious content, which can then be executed in the production environment. As a result, the vulnerability can provide the attacker with unauthorized access to sensitive data and the capability to run arbitrary commands, effectively escalating privileges and compromising system integrity.

Affected Systems

Vitess, the database clustering system for MySQL, is affected in all releases before 23.0.3 and 22.0.4. The issue arises when the user has write permissions to the backup storage location, such as an S3 bucket. The vendor released a patch in version 23.0.3 for the mainline and 22.0.4 for the 22.x branch, addressing the manifest validation and file path handling. Systems using earlier versions with unrestricted backup storage access are at risk.

Risk and Exploitability

The CVSS score of 9.3 indicates a critical severity. The EPSS score of less than 1% suggests that exploitation probability is currently low, possibly due to the need for privileged backup storage access. The vulnerability is not listed in the CISA KEV catalog, so no active exploitation reports are known yet. Nevertheless, an attacker who can write to the backup location can inject malicious paths into the manifest which will be processed during restore, resulting in arbitrary file writes. This attack path typically requires a trusted user or compromised backup storage credentials, but once exploited it can lead to remote code execution in the database cluster environment.

Generated by OpenCVE AI on April 17, 2026 at 14:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vitess to version 23.0.3 or later (or 22.0.4 for the 22.x branch) to apply the manifest validation fix.
  • Limit backup storage permissions to the minimum required; remove write access from untrusted users or accounts that have access to the backup bucket.
  • Implement signed or encrypted backup manifests if available, and verify backup integrity to prevent tampering.

Generated by OpenCVE AI on April 17, 2026 at 14:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r492-hjgh-c9gw Vitess users with backup storage access can write to arbitrary file paths on restore
History

Fri, 27 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation vitess
CPEs cpe:2.3:a:linuxfoundation:vitess:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation vitess
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Vitessio
Vitessio vitess
Vendors & Products Vitessio
Vitessio vitess

Thu, 26 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the manifest — which may be files that they have also added to the manifest and backup contents — are written to any accessible location on restore. This is a common path traversal security issue. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. No known workarounds are available.
Title Vitess users with backup storage access can write to arbitrary file paths on restore
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:L/SC:L/SI:H/SA:H'}


Subscriptions

Linuxfoundation Vitess
Vitessio Vitess
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T19:33:53.738Z

Reserved: 2026-02-25T03:24:57.793Z

Link: CVE-2026-27969

cve-icon Vulnrichment

Updated: 2026-02-26T19:33:49.016Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-26T02:16:24.177

Modified: 2026-02-27T18:28:21.607

Link: CVE-2026-27969

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:30:20Z

Weaknesses