Skip to content

x/vulndb: potential Go vuln in vitess.io/vitess: GHSA-8g8j-r87h-p36x #4567

@GoVulnBot

Description

@GoVulnBot

Advisory GHSA-8g8j-r87h-p36x references a vulnerability in the following Go modules:

Module
vitess.io/vitess

Description:

Impact

Any user with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that arbitrary code is later executed when that backup is restored. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there.

Patches

Fixes are expected to be released with versions v23.0.3 and v22.0.4
See fix commit at vitessio/vitess@4c017329390...

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: vitess.io/vitess
      vulnerable_at: 0.23.2
summary: |-
    Vitess users with backup storage access can gain unauthorized access to
    production deployment environments in vitess.io/vitess
cves:
    - CVE-2026-27965
ghsas:
    - GHSA-8g8j-r87h-p36x
references:
    - advisory: https://github.com/advisories/GHSA-8g8j-r87h-p36x
    - advisory: https://github.com/vitessio/vitess/security/advisories/GHSA-8g8j-r87h-p36x
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2026-27965
    - fix: https://github.com/vitessio/vitess/commit/4c0173293907af9cb942a6683c465c3f1e9fdb5c
    - fix: https://github.com/vitessio/vitess/pull/19460
    - report: https://github.com/vitessio/vitess/issues/19459
source:
    id: GHSA-8g8j-r87h-p36x
    created: 2026-02-26T23:01:42.492134087Z
review_status: UNREVIEWED

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions