Vitess users with backup storage access can write to arbitrary file paths on restore
Package
Affected versions
>= 0.23.0-rc1, < 0.23.3
< 0.22.4
Patched versions
0.23.3
0.22.4
Description
Published by the National Vulnerability Database
Feb 26, 2026
Published to the GitHub Advisory Database
Feb 27, 2026
Reviewed
Feb 27, 2026
Last updated
Feb 27, 2026
Impact
Anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the manifest — which may be files that they have also added to the manifest and backup contents — are written to any accessible location on restore. This is a common Path Traversal security issue. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there.
Patches
v23.0.3 and v22.0.4
Resources
vitessio/vitess#19470
References