Description
Backstage is an open framework for building developer portals. Prior to 0.6.11, the unprocessed entities read endpoints in @backstage/plugin-catalog-backend-module-unprocessed do not enforce permission authorization checks. Any authenticated user can access unprocessed entity records regardless of ownership. This is an information disclosure vulnerability affecting Backstage installations using this module. This is patched in @backstage/plugin-catalog-backend-module-unprocessed version 0.6.11, @backstage/plugin-catalog-unprocessed-entities-common version 0.0.15 and @backstage/plugin-catalog-unprocessed-entities version 0.2.30.
Published: 2026-05-14
Score: 4.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the unprocessed entities read endpoints of Backstage’s catalog backend module. The code handling these endpoints fails to enforce permission checks, which allows any authenticated user to read unprocessed entity records irrespective of ownership. As a result, sensitive information about entities that belong to other owners can be disclosed. This weakness is classified as CWE‑863, reflecting missing authorization checks on data objects.

Affected Systems

Backstage installations that use @backstage/plugin-catalog-backend-module-unprocessed, @backstage/plugin-catalog-unprocessed-entities, or @backstage/plugin-catalog-unprocessed-entities-common without applying the recent security patch. The specific patched versions are 0.6.11 for the backend module, 0.2.30 for the unprocessed entities plugin, and 0.0.15 for the common unprocessed entities utilities. Any installation using older versions of these components is affected.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity. No EPSS information is available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred to be an authenticated attacker who can authenticate to the Backstage instance and then exploit the missing permission checks by issuing read requests to the unprocessed endpoints. The impact is confined to information disclosure and does not allow escalation or disruption of services.

Generated by OpenCVE AI on May 14, 2026 at 16:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update @backstage/plugin-catalog-backend-module-unprocessed to version 0.6.11 or newer
  • Upgrade @backstage/plugin-catalog-unprocessed-entities to version 0.2.30 or newer
  • Upgrade @backstage/plugin-catalog-unprocessed-entities-common to version 0.0.15 or newer

Generated by OpenCVE AI on May 14, 2026 at 16:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p7g9-rp3g-mgfg Backstage: Catalog unprocessed read endpoints allow authenticated cross-owner data access without permission checks
History

Thu, 14 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description Backstage is an open framework for building developer portals. Prior to 0.6.11, the unprocessed entities read endpoints in @backstage/plugin-catalog-backend-module-unprocessed do not enforce permission authorization checks. Any authenticated user can access unprocessed entity records regardless of ownership. This is an information disclosure vulnerability affecting Backstage installations using this module. This is patched in @backstage/plugin-catalog-backend-module-unprocessed version 0.6.11, @backstage/plugin-catalog-unprocessed-entities-common version 0.0.15 and @backstage/plugin-catalog-unprocessed-entities version 0.2.30.
Title Backstage: Catalog unprocessed read endpoints allow authenticated cross-owner data access without permission checks
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-14T14:30:04.945Z

Reserved: 2026-05-05T20:15:20.631Z

Link: CVE-2026-44374

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T15:16:48.250

Modified: 2026-05-14T18:17:11.253

Link: CVE-2026-44374

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T16:30:24Z

Weaknesses