Description
Backstage is an open framework for building developer portals. Prior to version 3.1.4, a malicious scaffolder template can bypass the log redaction mechanism to exfiltrate secrets provided run through task event logs. This issue has been patched in version 3.1.4.
Published: 2026-03-07
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality Breach
Action: Apply Patch
AI Analysis

Impact

A malicious scaffolder template can bypass the log‑redaction mechanism in Backstage, allowing secrets such as session tokens to be written into task event logs. The vulnerability enables an attacker to exfiltrate sensitive data that should have been sanitized before logging, potentially compromising authentication tokens and other confidential information.

Affected Systems

Backstage, the open framework for developer portals, is affected in all releases prior to version 3.1.4. The issue has been patched in 3.1.4 and later versions.

Risk and Exploitability

The CVSS score is 2, indicating a low severity assessment, and the EPSS score is less than 1 %, suggesting a very low probability of public exploitation. However, the vulnerability can be exploited by an attacker who can supply or modify a scaffolder template. The attack requires the ability to insert custom templates into the Backstage instance, after which the template's execution will generate event logs that contain the leaked secrets. While the immediate risk is limited, the exposure of sensitive tokens could enable further compromise if additional system access is achieved.

Generated by OpenCVE AI on April 16, 2026 at 10:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Backstage to version 3.1.4 or newer, which removes the log‑redaction bypass
  • Ensure that log‑redaction is enabled and correctly configured for all log streams
  • Restrict scaffolder template creation to a trusted whitelist and validate templates before deployment

Generated by OpenCVE AI on April 16, 2026 at 10:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8qp7-fhr9-fw53 @backstage/plugin-scaffolder-backend Vulnerable to Potential Session Token Exfiltration via Log Redaction Bypass
History

Tue, 21 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation \@backstage\/plugin-scaffolder-backend
CPEs cpe:2.3:a:linuxfoundation:\@backstage\/plugin-scaffolder-backend:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation \@backstage\/plugin-scaffolder-backend

Tue, 10 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-117
References
Metrics threat_severity

None

threat_severity

Low


Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Backstage
Backstage backstage
Vendors & Products Backstage
Backstage backstage

Sat, 07 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description Backstage is an open framework for building developer portals. Prior to version 3.1.4, a malicious scaffolder template can bypass the log redaction mechanism to exfiltrate secrets provided run through task event logs. This issue has been patched in version 3.1.4.
Title @backstage/plugin-scaffolder-backend: Potential Session Token Exfiltration via Log Redaction Bypass
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N'}


Subscriptions

Backstage Backstage
Linuxfoundation \@backstage\/plugin-scaffolder-backend
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T20:24:16.597Z

Reserved: 2026-03-04T14:44:00.714Z

Link: CVE-2026-29184

cve-icon Vulnrichment

Updated: 2026-03-09T20:15:42.441Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T15:15:55.080

Modified: 2026-04-21T14:20:02.760

Link: CVE-2026-29184

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-07T15:03:18Z

Links: CVE-2026-29184 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses